Cyber Security News Archive

Secure Your Containers with Confidential Computing in the Cloud

By Ambuj Kumar, co-founder and CEO, FortanixDevelopment and deployment of container-based software has become a popular movement in technology. Docker, and container technology in...

Unraveling the Marriott Breach & Examining Credential Theft Attacks

BY: Tim Keeler, Founder & CEO at RemediantWhat HappenedThe recent Marriott breach involved the theft of employee credentials. Specifically, attackers obtained the login credentials for...

How to Communicate the Business Value of a Cybersecurity Program

Author: Tim Sadler, CEO and co-founder, TessianCommunicating cybersecurity ROI to a company’s leadership team is no easy task. Security leaders are faced with placing...

Addressing the Opportunities of SOAR: What Organizations Need to Know

Addressing the Opportunities of SOAR: What Organizations Need to KnowBy Matt Eberhart, chief revenue officer, Respond SoftwareSecurity operations teams have the unenviable task of...

Coronavirus Cyber Pandemic: You Don’t Bite the Hand that Heals You (but They Do…)

By Marie Le Pargneux, CDO, TEHTRISHealth facilities traditionally bring us support in both the most challenging and happiest times in our lives. Today, they...

The New Cybersecurity Battleground

A Tactical Perspective in a Post-Pandemic Worldby Tyler Ward, CISSP, MBA, GCIH, GSEC, VP, Security, IGIThe COVID-19 pandemic has led to an influx of...

In These (Use) Cases, It’s Ok to Lie

We are taught never to lie, but if one opponent uses it, then deception becomes required by the other in order to winby Carolyn...

Racing against China, ‘quantum supremacy’ and economic supremacy are one and the same

By John PriscoA pandemic opportunity for state-sponsored hackersIf anyone thought the global coronavirus pandemic would tamp down state-sponsored hacking and intellectual property theft --...

Using Metrics to Strengthen Security Programs and Convey Value

The CISO’s Guide to Metrics that MatterBy Colin O’Connor, Chief Operating Officer, ReliaQuestOne of the most challenging tasks for today’s CISO is quantifying the...

COVID19 Pandemic 2020: New Security Challenges to Cyber Security Blue Teams

by Jalasutram Sai Praveen Kumar, Cyber Security Researcher & Individual ContributorCOVID19 coronavirus pandemic outbreak in early 2020 has significantly impacted multiple countries and diverse...

Ready or Not, CMMC to be enforced July 1st, 2020

COVID-19 will not delay the implementation of the CMMC on contractsby Jeffrey R. Wells and  Jason M. SchwentThe Cybersecurity Maturity Model Certification (“CMMC”) is...

How to avoid Zoom and increase your privacy while working from home

How to avoid Zoom while working from home, from beginner to advancedby Bernard Meyer, Senior Researcher, CyberNews.comZoom is certainly the talk of the...