Cyber Security News Archive

How Deception Technology Helps to Protect Against IoT Attacks

Carolyn Crandall, Chief Deception Officer at Attivo NetworksSecuring both business and operation technology (OT) networks effectively against cyber threats is a constant challenge. It...

Saving the SOC. How to Increase Investigation Speed, Efficiency and Accuracy

By Nir Greenberg, senior director of field engineering and customer success, Illusive NetworksThe status quo for most SOCs is untenable. Analysts are burning out....

How To Secure IT And OT In Industrial And Manufacturing Environments

by Chris Dobrec, Vice President of Product Marketing, ArmisOperational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to cyber attacks....

Technology for Contact Tracing Needs to Focus on API Security While Easing “Stay at Home” Restrictions

By Alban Diquet, Head of Engineering, Data TheoremMany countries are easing “stay at home” restrictions imposed to combat the novel coronavirus. Government and health...

Building a Telework Health Scorecard to Meet Surge Requirements and Long-Term Resiliency

By: Stan Lowe, Global Chief Information Security Officer, ZscalerOver the past months, the U.S. Federal government has deployed solutions to keep employees productive and...

3 Practical Tips on How to Improve PCI Compliance

By Rob Chapman, Director of Security Architecture, Cybera (www.cybera.com)When I look back on the various PCI programs that I’ve run, three key items always...

AI is Helping Change the Landscape of Cyber Attacks and Prevention

AI is Helping Change the Landscape of Cyber Attacks and Preventionby Daniel William Carter, Content Director and a Cyber Security Director, IDStrongArtificial Intelligence is...

How to Teach Your Parents and Grandparents About Cybersecurity

And how to prevent their identities from being stolenby Martin BanksHuman error is one of the leading causes behind cybersecurity breaches. Even if...

A Passwordless Future: Will Biometric Identification Replace Passwords?

by Joshua FrisbyFrom Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely...

Detecting an Insider Threat

By Milica D. DjekicThe insider threat has been a challenge to the business, economy and community for a long period of time. There...

Familiar threats with higher stakes: Why vaccine espionage is a “crisis messenger” alarm for the pharmaceutical industry

By: Rajiv Dholakia, Chief Product Officer, VERAA mentor of mine once said “Crisis is a messenger - if you listen carefully.” In the current...

How to Stay Safe on Public Wi-Fi (Top 5 Safety Tips)

Follow these 5 public Wi-Fi safety tips to stay secure on public networks.by Susan Alexandra, Freelance Tech WriterPublic Wi-Fi is the main source of...