Cyber Security News Archive

Building a Telework Health Scorecard to Meet Surge Requirements and Long-Term Resiliency

By: Stan Lowe, Global Chief Information Security Officer, ZscalerOver the past months, the U.S. Federal government has deployed solutions to keep employees productive and...

3 Practical Tips on How to Improve PCI Compliance

By Rob Chapman, Director of Security Architecture, Cybera (www.cybera.com)When I look back on the various PCI programs that I’ve run, three key items always...

AI is Helping Change the Landscape of Cyber Attacks and Prevention

AI is Helping Change the Landscape of Cyber Attacks and Preventionby Daniel William Carter, Content Director and a Cyber Security Director, IDStrongArtificial Intelligence is...

How to Teach Your Parents and Grandparents About Cybersecurity

And how to prevent their identities from being stolenby Martin BanksHuman error is one of the leading causes behind cybersecurity breaches. Even if...

A Passwordless Future: Will Biometric Identification Replace Passwords?

by Joshua FrisbyFrom Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely...

Detecting an Insider Threat

By Milica D. DjekicThe insider threat has been a challenge to the business, economy and community for a long period of time. There...

Familiar threats with higher stakes: Why vaccine espionage is a “crisis messenger” alarm for the pharmaceutical industry

By: Rajiv Dholakia, Chief Product Officer, VERAA mentor of mine once said “Crisis is a messenger - if you listen carefully.” In the current...

How to Stay Safe on Public Wi-Fi (Top 5 Safety Tips)

Follow these 5 public Wi-Fi safety tips to stay secure on public networks.by Susan Alexandra, Freelance Tech WriterPublic Wi-Fi is the main source of...

Secure Your Containers with Confidential Computing in the Cloud

By Ambuj Kumar, co-founder and CEO, FortanixDevelopment and deployment of container-based software has become a popular movement in technology. Docker, and container technology in...

Unraveling the Marriott Breach & Examining Credential Theft Attacks

BY: Tim Keeler, Founder & CEO at RemediantWhat HappenedThe recent Marriott breach involved the theft of employee credentials. Specifically, attackers obtained the login credentials for...

How to Communicate the Business Value of a Cybersecurity Program

Author: Tim Sadler, CEO and co-founder, TessianCommunicating cybersecurity ROI to a company’s leadership team is no easy task. Security leaders are faced with placing...

Addressing the Opportunities of SOAR: What Organizations Need to Know

Addressing the Opportunities of SOAR: What Organizations Need to KnowBy Matt Eberhart, chief revenue officer, Respond SoftwareSecurity operations teams have the unenviable task of...