Category: Uncategorized

How to Stay Safe on Public Wi-Fi (Top 5 Safety Tips)

Follow these 5 public Wi-Fi safety tips to stay secure on public networks.by Susan Alexandra, Freelance Tech WriterPublic Wi-Fi is the main source of malware and data thefts. It is unavoidable in...

Secure Your Containers with Confidential Computing in the Cloud

By Ambuj Kumar, co-founder and CEO, FortanixDevelopment and deployment of container-based software has become a popular movement in technology. Docker, and container technology in general, has redefined cloud computing and offers significant...

Unraveling the Marriott Breach & Examining Credential Theft Attacks

BY: Tim Keeler, Founder & CEO at RemediantWhat HappenedThe recent Marriott breach involved the theft of employee credentials. Specifically, attackers obtained the login credentials for two franchise property employees which gave them access...

How to Communicate the Business Value of a Cybersecurity Program

Author: Tim Sadler, CEO and co-founder, TessianCommunicating cybersecurity ROI to a company’s leadership team is no easy task. Security leaders are faced with placing a value on things that haven’t even happened,...

Addressing the Opportunities of SOAR: What Organizations Need to Know

Addressing the Opportunities of SOAR: What Organizations Need to KnowBy Matt Eberhart, chief revenue officer, Respond SoftwareSecurity operations teams have the unenviable task of sifting through endless security alerts to find the...

Coronavirus Cyber Pandemic: You Don’t Bite the Hand that Heals You (but They Do…)

By Marie Le Pargneux, CDO, TEHTRISHealth facilities traditionally bring us support in both the most challenging and happiest times in our lives. Today, they are the ones that need help, as cyber-attackers...

The New Cybersecurity Battleground

A Tactical Perspective in a Post-Pandemic Worldby Tyler Ward, CISSP, MBA, GCIH, GSEC, VP, Security, IGIThe COVID-19 pandemic has led to an influx of new cyber-attacks, trends, and more importantly, perspective. The...

In These (Use) Cases, It’s Ok to Lie

We are taught never to lie, but if one opponent uses it, then deception becomes required by the other in order to winby Carolyn Crandall, Chief Deception Officer, Attivo NetworksFrom childhood, we...

Follow us

20,832FansLike
2,389FollowersFollow
0SubscribersSubscribe

Instagram

Most Popular

6 Tips to Avoid Text Scams this Holiday Season

‘Tis the season for ecommerce and cyber-scroogesBrien Jones-Lantzy, Head of Carrier Relations, InfobipAs the coronavirus pandemic hit, people’s lives were upended and consumers had...

Navigating the Nature of Remote Work and Securing Employee Communications

 The remote work trend does not show signs of stopping. According to survey data from KPMG that investigates the work experience post-COVID-19, 68 percent...

What Is Cryptojacking and How Do You Prevent It?

 How worried should you be?by Martin BanksCybersecurity professionals know the importance of staying abreast of emerging threats and taking decisive action to conquer them....