Search Results: 4282 Articles Found for SECURITY

Header

Tech Top6

1) CISA Tells Agencies to Fix Hundreds of Software Flaws
Source: CYBERSCOOP
Category:Security
Author: Tim Starks, Sr Editor
Posting Date: 2021-11-03
Publish Date: 2021-11-03 

2) InfoSec and Business Alignment Lowers Breach Cost, Boosts Security
Source: Dark Reading
Category:Security
Author: Kelly Sheridan, Staff Editor
Posting Date: 2021-11-03
Publish Date: 2021-11-03 

3) 7 Trends: How Ransomware Operations Continue to Evolve
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-11-03
Publish Date: 2021-11-02 

4) When Containers Become a Nightmare
Source: infoWorld
Category:Security
Author: David Linthicum, Chief Cloud Strategy Officer @ Deloitte
Posting Date: 2021-11-09
Publish Date: 2021-11-02 

5) Tougher Crypto Rules Key to Stifling Ransomware Attacks
Source: BECKER'S HEALTH IT
Category:Security
Author: Hannah Mitchell
Posting Date: 2021-10-28
Publish Date: 2021-10-28 

6) Conti Ransomware Explained
Source: CSO Online
Category:Security
Author: Lucian Constantin, Sr Writer
Posting Date: 2021-11-01
Publish Date: 2021-10-28 

7) 5 Steps to Security Incident Response Planning
Source: CSO Online
Category:Security
Author: Susan Bradley, IT Wrangler @ Tamiyasu, Smith, Horn & Braun
Posting Date: 2021-11-01
Publish Date: 2021-10-27 

8) Expert’s Take: Why Organizations Fail to Prepare for Cyberattacks
Source: CISO Magazine
Category:Security
Author: Brian Pereira, Editor-in-Chief
Posting Date: 2021-10-29
Publish Date: 2021-10-26 

9) Technology, Not Training, Protects Users from Phishing
Source: Security Brief
Category:Security
Author: Andrew Shikiar, Executive Director @ Fido Alliance
Posting Date: 2021-10-27
Publish Date: 2021-10-21 

10) Why XDR Makes Crowdstrike’s CTO Cringe
Source: SDX CENTRAL
Category:Security
Author: Jessica Lyons Hardcastle, Managing Editor
Posting Date: 2021-10-27
Publish Date: 2021-10-21 

11) How the Dark Web Works
Source: CyberProtection Magazine
Category:Security
Posting Date: 2021-11-01
Publish Date: 2021-10-19 

12) KillWare: Hype Is Bigger Than the Threat, for Now
Source: SECURITY BOULEVARD
Category:Security
Author: Teri Robinson, Technology & Cybersecurity Writer
Posting Date: 2021-10-21
Publish Date: 2021-10-15 

13) Why Privileged Access Management Matters
Source: INFOSECURITY MAGAZINE
Category:Security
Author: Eleanor Barlow, Content Manager
Posting Date: 2021-10-17
Publish Date: 2021-10-14 

14) How to Create an Effective Security Policy: 6 Tips
Source: ENTERPRISERS PROJECT
Category:Security
Author: Kevin Casey, Technology Writer
Posting Date: 2021-10-17
Publish Date: 2021-10-13 

15) List of IT Assets an Attacker is Most Likely to Target For Exploitation
Source: HELPNET SECURITY
Category:Security
Posting Date: 2021-10-17
Publish Date: 2021-10-13 

16) Ransomware: No Decline in Victims Posted to Data Leak Sites
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-10-12
Publish Date: 2021-10-12 

17) The 5 Phases of Zero-Trust Adoption
Source: Dark Reading
Category:Security
Author: Steve Riley, Field CTO @ Netskope
Posting Date: 2021-10-12
Publish Date: 2021-10-11 

18) 7 Smart Ways a Security Team Can Win Stakeholder Trust
Source: Dark Reading
Category:Security
Author: Joshua Goldfarb, Director Of Product Management @ F5
Posting Date: 2021-10-12
Publish Date: 2021-10-11 

19) Windows Privilege Escalation: Weak Services Permission
Source: HACKING ARTICLES
Category:Security
Author: Aarti Singh, Researcher & Technical Writer @ Hacking Articles
Posting Date: 2021-10-17
Publish Date: 2021-10-11 

20) Digital Transformation: The Leading Factor for API Attacks
Source: CyberProtection Magazine
Category:Security
Author: Sharon Mantin, CEO & Founder @ Imvision
Posting Date: 2021-10-11
Publish Date: 2021-10-09 

21) Why App Security Should Be a Major Concern
Source: GbHackers
Category:Security
Author: Rebecca James, Cybersecurity Journalist
Posting Date: 2021-10-17
Publish Date: 2021-10-09 

22) Fast-Moving Ryuk Campaign Targets Healthcare Organisations
Source: COMPUTERWEEKLY
Category:Security
Author: Alex Scroxton, Security Editor
Posting Date: 2021-10-11
Publish Date: 2021-10-07 

23) Top Cybersecurity Statistics, Trends, and Facts
Source: CSO Online
Category:Security
Author: Brian Carlson, Contributing Writer
Posting Date: 2021-10-11
Publish Date: 2021-10-07 

24) How Zero Trust Supports IT and OT Security
Source: CyberProtection Magazine
Category:Security
Author: Nathan Howe, VP Emerging Technologies @ Zscaler
Posting Date: 2021-10-11
Publish Date: 2021-10-07 

25) 5 Steps Toward Real Zero Trust Security
Source: CSO Online
Category:Security
Author: Neal Weinberg, Technology Writer
Posting Date: 2021-10-06
Publish Date: 2021-10-06 

26) Five Functions That Benefit from Cybersecurity Automation
Source: DATA CENTER KNOWLEDGE
Category:Security
Author: Maria Korolov, Technology Journalist
Posting Date: 2021-10-12
Publish Date: 2021-10-06 

27) 4 Steps to Protect the C-Suite from Business Email Compromise Attacks
Source: CSO ONLINE
Category:Security
Author: Rosalyn Page, Contributing Writer
Posting Date: 2021-10-05
Publish Date: 2021-10-04 

28) Taking a Preventative Approach Against Ransomware
Source: CPO MAGAZINE
Category:Security
Author: Jack Garnsey, Product Manager Security Awareness Training @ VIPR
Posting Date: 2021-10-11
Publish Date: 2021-10-04 

29) Why Today’s Cybersecurity Threats are More Dangerous
Source: CSO Online
Category:Security
Author: Cynthia Brumfield, Cybersecurity Analyst @ Metacurity.Com
Posting Date: 2021-10-11
Publish Date: 2021-10-04 

30) A Journey in Organizational Resilience: Crisis Management
Source: SECURITY INTELLIGENCE
Category:Security
Author: George Platsis, Senior Lead Technologist @ Booz Allen Hamilton
Posting Date: 2021-10-17
Publish Date: 2021-10-04 

31) Why Cybersecurity Professionals Should Take a Page From Voldemort’s Book
Source: CPO MAGAZINE
Category:Security
Author: Dr. Pali Surdhar, Director Product Security @ Entrust
Posting Date: 2021-10-11
Publish Date: 2021-10-01 

32) Zero Trust Security: What It Is and Why Adoption Is Increasing
Source: CONTINUITY CENTRAL
Category:Security
Author: Bryan Patton, Principal Solutions Consultant @ Quest
Posting Date: 2021-10-07
Publish Date: 2021-09-29 

33) Free REvil Ransomware Master Decrypter Released for Past Victims
Source: BleepingComputer
Category:Security
Author: Lawrence Abrams, Editor In Chief
Posting Date: 2021-09-20
Publish Date: 2021-09-16 

34) Ransomware Gang Threatens to Wipe Decryption Key If Negotiator Hired
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Lawrence Abrams, Editor In Chief
Posting Date: 2021-09-20
Publish Date: 2021-09-15 

35) The Three Pillars of Unified Risk Management for Product Security
Source: INFOSECURITY MAGAZINE
Category:Security
Author: Altaz Valani, Director, Insights Research @ Security Compass
Posting Date: 2021-09-14
Publish Date: 2021-09-13 

36) Constant Threat of Ransomware Causing Data Protection Headaches
Source: Security Brief
Category:Security
Author: Shannon Williams
Posting Date: 2021-09-15
Publish Date: 2021-09-13 

37) Top 3 Ransomware Attack Vectors and How to Avoid Them
Source: SEARCH SECURITY
Category:Security
Author: Diana Kelley, CTO & Founder @ SecurityCurve
Posting Date: 2021-09-13
Publish Date: 2021-09-12 

38) MSSQL for Pentester: Abusing Linked Database
Source: HACKING ARTICLES
Category:Security
Author: Yashika Dhir, Pen Tester @ Vayam Technologies Ltd.
Posting Date: 2021-09-13
Publish Date: 2021-09-11 

39) Attacking Cryptocurrency Theft: Transaction Databases and Analytics
Source: GARP
Category:Security
Author: Katherine Heires, Founder @ Mediakat Llc
Posting Date: 2021-09-13
Publish Date: 2021-09-10 

40) Why Cybersecurity Should Be Prioritized for the Hybrid Working World
Source: HELPNET SECURITY
Category:Security
Author: Chris Vaughan, Area VP EMEA @ Tanium
Posting Date: 2021-09-13
Publish Date: 2021-09-10 

41) NTLM Relay Attacks Explained
Source: CSO Online
Category:Security
Author: Chris Hughes, CISO & Co-Founder @ Aquia
Posting Date: 2021-09-12
Publish Date: 2021-09-09 

42) How China’s Information Protection Law Affects Businesses
Source: DATA BREACH TODAY
Category:Security
Author: Soumik Ghosh, Assistant Editor, Asia
Posting Date: 2021-09-12
Publish Date: 2021-09-09 

43) Increase In Scope of Cybersecurity from SW to HW Protection
Source: CISO Magazine
Category:Security
Author: Neil Okikiolu, CEO & Founder @ Simius Technologies Inc.
Posting Date: 2021-09-09
Publish Date: 2021-09-08 

44) Japanese Crypto Exchange Robbed of $100,000,000
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Ty Mezquita
Posting Date: 2021-09-20
Publish Date: 2021-09-08 

45) Jetblue CISO Tells Data Centers to Concentrate on Threat Actors
Source: DATA CENTER KNOWLEDGE
Category:Security
Author: Christine Hall
Posting Date: 2021-09-12
Publish Date: 2021-09-07 

46) 8 Must-Ask Security Analyst Interview Questions
Source: CSO Online
Category:Security
Author: Mary Brandel, Technology & Management Writer
Posting Date: 2021-09-07
Publish Date: 2021-09-06 

47) U.S. Cyber Command Warns Active Exploitation of Atlassian Confluence Vulnerability
Source: CISO Magazine
Category:Security
Posting Date: 2021-09-09
Publish Date: 2021-09-06 

48) How Does CIEM Reduce Identity Access Risk?
Source: CyberProtection Magazine
Category:Security
Author: Yehudah Sunshine, Security Evangelist @ Odix
Posting Date: 2021-09-12
Publish Date: 2021-09-06 

49) Why Ransomware Hackers Love a Holiday Weekend
Source: ARS TECHNICA
Category:Security
Author: Brian Barrett, Editor @ WIRED.COM
Posting Date: 2021-09-06
Publish Date: 2021-09-05 

50) Cyber Security: New Threats, A New Approach
Source: CIO REVIEW
Category:Security
Author: William Stewart, SVP Corporate Stategy @ FireEye, Inc.
Posting Date: 2021-09-06
Publish Date: 2021-09-05 

51) The Common Vulnerabilities Leaving Industrial Systems Open To Attack
Source: VENTURE BEAT
Category:Security
Author: Sage Lazzaro, Data Privacy & Security Reporter
Posting Date: 2021-09-07
Publish Date: 2021-09-05 

52) Five Tough Questions You Need To Answer About Ransomware
Source: CONTINUITY CENTRAL
Category:Security
Author: Jim McGann, VP Marketing & Business Development @ Index Engines
Posting Date: 2021-09-07
Publish Date: 2021-09-03 

53) What Is AS-REP Roasting Attack, Really?
Source: THE HACKER NEWS
Category:Security
Posting Date: 2021-09-05
Publish Date: 2021-09-02 

54) Only 1 In 5 Companies Are Confident Their Infrastructure Security
Source: aiTechPark
Category:Security
Posting Date: 2021-09-07
Publish Date: 2021-09-02 

55) Protecting Sensitive and Personal Information From Ransomware-Caused Data Breaches
Source: CISA
Category:Security
Posting Date: 2021-09-01
Publish Date: 2021-09-01 

56) Attackers Keep Refining Business Email Compromise Schemes
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-09-01
Publish Date: 2021-09-01 

57) 10 Ways to Prevent Email Phishing Attacks
Source: GbHackers
Category:Security
Author: Mathias Klenk, CEO & Co-Founder @ Passbase -
Posting Date: 2021-09-02
Publish Date: 2021-09-01 

58) Finding And Using the Right Cybersecurity Incident Response Tools
Source: HELPNET SECURITY
Category:Security
Author: Ran Harel, Principal Security Product Manager, Semperis
Posting Date: 2021-09-02
Publish Date: 2021-09-01 

59) SEC Sanctions Eight Firms Over Deficient Cybersecurity Procedures
Source: INFOSECURITY MAGAZINE
Category:Security
Author: Sarah Coble, News Writer
Posting Date: 2021-09-02
Publish Date: 2021-09-01 

60) Top Five Pitfalls when Considering Client Side Security
Source: SECURITYWEEK
Category:Security
Author: Joshua Goldfarb, Director Product Management @ F5
Posting Date: 2021-09-05
Publish Date: 2021-09-01 

61) Half Of Businesses Can't Spot These Signs of Insider Cybersecurity Threats
Source: ZDnet
Category:Security
Author: Danny Palmer, Sr Reporter
Posting Date: 2021-09-06
Publish Date: 2021-09-01 

62) Former Credit Union Employee Pleads Guilty to Destruction of Data
Source: THE REGISTER
Category:Security
Author: Thomas Claburn, Technology Journalist
Posting Date: 2021-09-06
Publish Date: 2021-09-01 

63) Half Of Businesses Can't Spot These Signs of Insider Cybersecurity Threats
Source: ZDNET
Category:Security
Author: Danny Palmer, Sr Reporter
Posting Date: 2021-09-07
Publish Date: 2021-09-01 

64) Former Credit Union Employee Pleads Guilty to Destruction of Data
Source: THE REGISTER
Category:Security
Posting Date: 2021-09-07
Publish Date: 2021-09-01 

65) Types Of Spamming
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Stephanie Lica, Writer
Posting Date: 2021-09-07
Publish Date: 2021-09-01 

66) Zero-Trust Is Not a Product or Solution That Can Be Installed
Source: CISO Magazine
Category:Security
Author: Kartik Shahani, Country Manager @ Tenable
Posting Date: 2021-10-07
Publish Date: 2021-09-01 

67) Here’s How to Secure Your Company Against Ransomware Attacks, According To CISA
Source: CYBERNEWS
Category:Security
Author: Pierluigi Paganini, Member Of The ENISA
Posting Date: 2021-09-01
Publish Date: 2021-08-31 

68) A CISO's Perspective on Ransomware Payments
Source: Dark Reading
Category:Security
Author: Brad Moldenhauer, CISO – Americas @ Zscaler
Posting Date: 2021-09-01
Publish Date: 2021-08-31 

69) MSSQL for Pentester: Impersonate
Source: HACKING ARTICLES
Category:Security
Author: Yashika Dhir, Pen Tester @ Vayam Technologies Ltd.
Posting Date: 2021-09-02
Publish Date: 2021-08-31 

70) New Ransomware LockFile Targets Intermittent Encryption Technique
Source: CISO Magazine
Category:Security
Posting Date: 2021-08-31
Publish Date: 2021-08-30 

71) Triggered By Email? Some Thoughts on How to Stay Safe
Source: COMPUTERWORLD
Category:Security
Author: Susan Bradley, IT Wrangler @ Tamiyasu, Smith, Horn & Braun
Posting Date: 2021-08-31
Publish Date: 2021-08-30 

72) Microsoft’s Biometrics Security System Explained
Source: COMPUTERWORLD
Category:Security
Author: Matt Kapko & Matthew Finnegan, Technology Writers
Posting Date: 2021-08-31
Publish Date: 2021-08-30 

73) CSO's Guide to the Worst and Most Notable Ransomware
Source: CSO Online
Category:Security
Posting Date: 2021-08-31
Publish Date: 2021-08-27 

74) IT Security Escalation Management Must Be Part of Every Contingency Plan
Source: CyberProtection Magazine
Category:Security
Author: Arno Van Züren, CSO @ Tresorit
Posting Date: 2021-09-01
Publish Date: 2021-08-27 

75) Five Tips for Improving Organizational Resilience
Source: CONTINUITY CENTRAL
Category:Security
Author: Padma Naidoo, Sr Security Consulting Manager @ Dimension Data
Posting Date: 2021-08-31
Publish Date: 2021-08-26 

76) Security Blind Spots Persist as Companies Cross-Breed Security with DevOps
Source: infoWorld
Category:Security
Author: David Braue Editor At Large
Posting Date: 2021-08-29
Publish Date: 2021-08-25 

77) 70% Of Cyber Pros Believe Cyber Insurance is Exacerbating Ransomware
Source: INFOSECURITY MAGAZINE
Category:Security
Author: James Coker Reporter
Posting Date: 2021-08-29
Publish Date: 2021-08-25 

78) Emerging Ransomware Groups
Source: CISO Magazine
Category:Security
Posting Date: 2021-08-31
Publish Date: 2021-08-25 

79) Endpoint Protection: Securing the Pieces That Make Up the Whole
Source: GCN
Category:Security
Author: Thomas Etheridge, SVP Services @ Crowdstrike
Posting Date: 2021-08-26
Publish Date: 2021-08-24 

80) MSSQL For Pentester: Discovery
Source: HACKING ARTICLES
Category:Security
Author: Yashika Dhir, Penetration Tester @ Ayam Technologies Ltd.
Posting Date: 2021-08-26
Publish Date: 2021-08-24 

81) 6 Client-Side Security Concerns Enterprises Should Care About
Source: Dark Reading
Category:Security
Author: Joshua Goldfarb, Director of Product Management @ F5
Posting Date: 2021-08-24
Publish Date: 2021-08-23 

82) CISA Updates Ransomware Tips
Source: GCN
Category:Security
Posting Date: 2021-08-26
Publish Date: 2021-08-23 

83) CISA: Patching ProxyShell Flaws in Exchange Servers Is Urgent
Source: INFORISKTODAY
Category:Security
Author: Mihir Bagwe, Sr Correspondent
Posting Date: 2021-08-26
Publish Date: 2021-08-23 

84) Web Server Penetration Testing Checklist
Source: GbHackers
Category:Security
Author: BALAJI, Editor in Chief
Posting Date: 2021-08-22
Publish Date: 2021-08-22 

85) Simple CTF Tryhackme Walkthrough
Source: HACKING ARTICLES
Category:Security
Author: Pavandeep Singh, Security Researcher @ AAA Technologies
Posting Date: 2021-08-22
Publish Date: 2021-08-21 

86) Ransomware: A Perfect Storm
Source: CPO MAGAZINE
Category:Security
Author: Haris Pylarinos, CEO & Co-Founder @ Hackthebox
Posting Date: 2021-08-20
Publish Date: 2021-08-20 

87) Researchers Unwittingly Assist in Cybercrime
Source: CyberProtection Magazine
Category:Security
Author: Lou Covey, Consulting Journalist
Posting Date: 2021-08-22
Publish Date: 2021-08-20 

88) CISA Shares Guidance on How to Prevent Ransomware Data Breaches
Source: BleepingComputer
Category:Security
Author: Sergiu Gatlan, Cybersecurity, Reporter
Posting Date: 2021-08-20
Publish Date: 2021-08-19 

89) Wanted: Disgruntled Employees to Deploy Ransomware
Source: KREBSONSECURITY
Category:Security
Author: Brian Krebs, Investigative Reporter
Posting Date: 2021-08-22
Publish Date: 2021-08-19 

90) Assume All Your Gadgets Have Been Hacked or are Hackable
Source: CYBERNEWS
Category:Security
Author: Vilius Petkauskas, Technology Journalist
Posting Date: 2021-08-22
Publish Date: 2021-08-19 

91) Trusting Zero Trust – The Case for Certifications and Standards
Source: Information Security Buzz
Category:Security
Author: John Walker, Visiting Professor @ NTU
Posting Date: 2021-08-26
Publish Date: 2021-08-19 

92) These Are The 3 Ps for Thwarting BEC Attacks
Source: CISO Magazine
Category:Security
Author: Rudra Srinivas, Sr Writer
Posting Date: 2021-08-18
Publish Date: 2021-08-18 

93) Privacy and Data Security: 10 Effective Ways to Keep Your Business Safe
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: David Odinegun, Founder @ Drivedigitalbuzz.Com
Posting Date: 2021-08-20
Publish Date: 2021-08-18 

94) Shadow IT Risks CISOs Should Know
Source: Cyber Security Hub
Category:Security
Author: Lisa Morgan,, Big Data & AI Writer
Posting Date: 2021-08-22
Publish Date: 2021-08-17 

95) Dozens Of STARTTLS Related Flaws Found Affecting Popular Email Clients
Source: THE HACKER NEWS
Category:Security
Author: Ravie Lakshmanan, Cybersecurity & Privacy Journalist
Posting Date: 2021-08-18
Publish Date: 2021-08-16 

96) 10 Patch Management Practices to Boost Your Organization’s Cybersecurity Posture
Source: Toolbox
Category:Security
Author: Tom Olzak, Security Writer
Posting Date: 2021-08-18
Publish Date: 2021-08-16 

97) Parcel Delivery Texts Now the Most Common Con-Trick
Source: BBC
Category:Security
Author: Kevin Peachey, Personal Finance Correspondent
Posting Date: 2021-08-18
Publish Date: 2021-08-16 

98) Prevention Is Better than Cure: The Ransomware Evolution
Source: CyberProtection Magazine
Category:Security
Author: Jack Garnsey
Posting Date: 2021-08-22
Publish Date: 2021-08-16 

99) 3 Factors to Consider When Adopting TLS 1.3 Network Encryption
Source: NETWORKCOMPUTING
Category:Security
Author: Danny Lobo, VP Engineering @ NETSCOUT
Posting Date: 2021-09-05
Publish Date: 2021-08-16 

100) The Role of Cybersecurity In Protecting Patient Safety
Source: CYBERSECURITY MAGAZINE
Category:Security
Author: Dr. Varin Khera @ ITSEC Group & Amit Gaur @ Nokia
Posting Date: 2021-08-15
Publish Date: 2021-08-13 

101) Ransomware Gangs Try to Exploit 'PrintNightmare' Flaws
Source: DATA BREACH TODAY
Category:Security
Author: Mihir Bagwe, Sr Correspondent
Posting Date: 2021-08-15
Publish Date: 2021-08-13 

102) Burp Suite for Pentester: Repeater
Source: HACKING ARTICLES
Category:Security
Author: Pavandeep Singh, Security Researcher @ AAA Technologies
Posting Date: 2021-08-16
Publish Date: 2021-08-13 

103) Stop the Breaches! Four Steps to Minimize Security Risks
Source: HELPNET SECURITY
Category:Security
Author: Jeff Schilling, Global CISO, Teleperformance
Posting Date: 2021-08-16
Publish Date: 2021-08-13 

104) Security Leadership Must Come from the Top of Organizations
Source: CONTINUITY CENTRAL
Category:Security
Author: Rick Jones, CEO & Co-Founder @ Digitalxraid
Posting Date: 2021-08-12
Publish Date: 2021-08-12 

105) Ransomware Recovery: 8 Steps to a Successful Recovery from Backups
Source: CSO Online
Category:Security
Author: Maria Korolov, Emerging Technology Writer
Posting Date: 2021-08-15
Publish Date: 2021-08-12 

106) Ransomware Attacks and Payment Demands Soar
Source: Dark Reading
Category:Security
Author: Jai Vijayan, Technology Reporter
Posting Date: 2021-08-15
Publish Date: 2021-08-12 

107) Importance of Cybersecurity in the Health-Tech Sector
Source: Digital First Magazine
Category:Security
Author: Pankit Desai, CEO & Co-Founder @ Sequretek
Posting Date: 2021-10-07
Publish Date: 2021-08-12 

108) Cyber Security for Data Sovereignty
Source: Cyber Security Hub
Category:Security
Author: Elizabeth Mixson, Managing Editor @ Intelligent Automation
Posting Date: 2021-08-15
Publish Date: 2021-08-11 

109) Do You Understand the Risk in Your Software Sausage?
Source: GCN
Category:Security
Author: Mike Dager, CEO @ Grammatech
Posting Date: 2021-08-16
Publish Date: 2021-08-11 

110) Politics and Security Don't Mix
Source: SECURITYWEEK
Category:Security
Author: Joshua Goldfarb, Director Of Product Management @ F5
Posting Date: 2021-08-18
Publish Date: 2021-08-11 

111) Solving Authorization for Software Developers
Source: infoWorld
Category:Security
Author: Graham Neray, CEO & Co-Founder @ Oso
Posting Date: 2021-08-12
Publish Date: 2021-08-10 

112) 5 Steps to Improving Defensive Posture By the End of 2021
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Isaac Kohen, VP Of R&D @ Teramind
Posting Date: 2021-08-12
Publish Date: 2021-08-10 

113) It's Time to Bridge the Gap Between Security and Development
Source: CIO DIVE
Category:Security
Author: Brian Eastwood, Technology Journalist
Posting Date: 2021-08-12
Publish Date: 2021-08-10 

114) Why Purple Teaming Is Wise
Source: Cyber Security Hub
Category:Security
Author: Lisa Morgan, Big Data & AI Writer
Posting Date: 2021-08-15
Publish Date: 2021-08-10 

115) How to Train Your SOC Staff: What Works and What Doesn't
Source: SECURITYWEEK
Category:Security
Author: Jeff Orloff, VP Products & Technical Services @ Rangeforce
Posting Date: 2021-08-18
Publish Date: 2021-08-10 

116) Enterprise IoT Security Practices Checklist That You Need to Follow
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Harshit Agarwal, CEO & Co-Founder @ Appknox
Posting Date: 2021-08-12
Publish Date: 2021-08-09 

117) A Critical Random Number Generator Flaw Affects Billions of IoT Devices
Source: THE HACKER NEWS
Category:Security
Author: Ravie Lakshmanan, Cybersecurity & Privacy Journalist
Posting Date: 2021-08-16
Publish Date: 2021-08-09 

118) Ransomware Reality In 2021: Victims Paid Up to $45 Million in Payouts
Source: CISO Magazine
Category:Security
Posting Date: 2021-08-08
Publish Date: 2021-08-06 

119) Why Should Hosting Providers Act Seriously Against DDos Attacks?
Source: Business 2 Community
Category:Security
Author: Diane H. Wong, Writer
Posting Date: 2021-08-08
Publish Date: 2021-08-05 

120) 4 Things You Should Know About Cybersecurity Pros
Source: CSO Online
Category:Security
Author: Jon Oltsik, Sr Principal Analyst @ ESG
Posting Date: 2021-08-08
Publish Date: 2021-08-05 

121) 5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Source: Dark Reading
Category:Security
Author: Yassir Abousselham, CISO @ Splunk
Posting Date: 2021-08-05
Publish Date: 2021-08-04 

122) NSA, CISA Release Guidance on Kubernetes Security
Source: DATA BREACH TODAY
Category:Security
Author: Akshaya Asokan, Sr Correspondent
Posting Date: 2021-08-05
Publish Date: 2021-08-04 

123) Windows Privilege Escalation: Seimpersonateprivilege
Source: HACKING ARTICLES
Category:Security
Author: Pavandeep Singh, Security Researcher @ AAA Technologies
Posting Date: 2021-08-05
Publish Date: 2021-08-04 

124) How To Prepare Your Windows Network for a Ransomware Attack
Source: CSO Online
Category:Security
Author: Susan Bradley, Contributing Writer
Posting Date: 2021-08-08
Publish Date: 2021-08-04 

125) Trusted Platform Module Security Defeated in 30 Minutes, No Soldering Required
Source: ARS TECHNICA
Category:Security
Author: Dan Goodin, Security Editor
Posting Date: 2021-08-03
Publish Date: 2021-08-03 

126) What Are the Differences of Antivirus and NDR?
Source: BIZCATALYST 360°
Category:Security
Posting Date: 2021-08-03
Publish Date: 2021-08-03 

127) What Is Enterprise Security Management?
Source: CIO INSIGHT
Category:Security
Author: Dan Virgillito, Security Researcher @ Infosec Institute
Posting Date: 2021-08-04
Publish Date: 2021-08-03 

128) Risk-Based Vulnerability Management – Overdue for Automation
Source: CISO Magazine
Category:Security
Author: John Bock, Sr. Research Scientist R&D @ Optiv
Posting Date: 2021-08-04
Publish Date: 2021-08-03 

129) Attackers Found Targeting Non-C-Suite Employees Via Spear Phishing
Source: CISO Magazine
Category:Security
Posting Date: 2021-08-04
Publish Date: 2021-08-03 

130) Average Cost of Data Breach Hits Record High
Source: CPO MAGAZINE
Category:Security
Author: Scott Ikeda. Technology Writer
Posting Date: 2021-08-04
Publish Date: 2021-08-03 

131) Average Cost to Buy Access to a Compromised Company: $1,000
Source: Dark Reading
Category:Security
Author: Robert Lemos, Data Scientist @ Lemos Associates
Posting Date: 2021-08-05
Publish Date: 2021-08-03 

132) The Importance of Compute Lifecycle Assurance in a Zero-Trust World
Source: HELPNET SECURITY
Category:Security
Author: Camille Morhardt, Director Security Initiatives @ Intel
Posting Date: 2021-08-05
Publish Date: 2021-08-03 

133) Don't Ask Whether to Pay a Ransom - Ask How Attackers Could Get In
Source: YBERSECURITY DIVE
Category:Security
Author: Samantha Ann Schwartz, Reporter
Posting Date: 2021-08-08
Publish Date: 2021-08-03 

134) PwnedPiper PTS Security Flaws Threaten 80% of Hospitals In the U.S.
Source: THE HACKER NEWS
Category:Security
Author: Ravie Lakshmanan, Cybersecurity & Privacy Journalist
Posting Date: 2021-08-03
Publish Date: 2021-08-02 

135) Top 5 Public Key Infrastructure (PKI) Pitfalls and How to Overcome Them
Source: Toolbox
Category:Security
Author: Tim Callan, Chief Compliance Officer @ Sectigo
Posting Date: 2021-08-03
Publish Date: 2021-08-02 

136) How Data-Driven Patch Management Can Defeat Ransomware
Source: VENTURE BEAT
Category:Security
Author: Louis Columbus, Product Management Leader @ Ingram Micro
Posting Date: 2021-08-03
Publish Date: 2021-08-02 

137) Dramatic Rise In Claims Due to Hacker Attacks
Source: CyberProtection Magazine
Category:Security
Author: Hanno Pingsmann, CEO @ Cyberdirekt
Posting Date: 2021-08-04
Publish Date: 2021-08-02 

138) Ransomware Attacks: No Longer a Matter of “If,” But “When”
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Daniel Burrus, CEO & Founder @ BURRUS RESEARCH, INC.
Posting Date: 2021-08-03
Publish Date: 2021-08-01 

139) Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-08-01
Publish Date: 2021-07-30 

140) Metasploit for Pentester: Creds
Source: HACKING ARTICLES
Category:Security
Author: Pavandeep Singh, Security Researcher @ AAA Technologies
Posting Date: 2021-08-01
Publish Date: 2021-07-30 

141) No Security Without Identity – No Identity Without Security
Source: PECB Insight
Category:Security
Author: Peter Geelen, Owner of Quest for Security
Posting Date: 2021-08-01
Publish Date: 2021-07-30 

142) How to Destigmatize Reporting Security Vulnerabilities
Source: SC Magazine
Category:Security
Author: Bradley Barth, Deputy Editor
Posting Date: 2021-08-02
Publish Date: 2021-07-30 

143) Ransomware, Backups, and Testing Your Plan
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Ty Mezquita
Posting Date: 2021-08-04
Publish Date: 2021-07-30 

144) 4 Steps to Creating Effective Post-Pandemic Data Security
Source: CYBERSECURITY MAGAZINE
Category:Security
Author: Tim Bandos, CISO @ Digital Guardian
Posting Date: 2021-08-05
Publish Date: 2021-07-30 

145) How Digital Forensics Complements Cybersecurity
Source: CISO Magazine
Category:Security
Author: Anis Pankhania CISO Cloud Infrastructure Services, Capgemini
Posting Date: 2021-07-30
Publish Date: 2021-07-29 

146) 10 Security Tools All Remote Employees Should Have
Source: CSO Online
Category:Security
Author: Tim Ferrill, IT Writer
Posting Date: 2021-07-30
Publish Date: 2021-07-29 

147) Ransomware Surged 93% Fueled by Triple Extortion
Source: CYBERNEWS
Category:Security
Author: Jurgita Lapienyte, Sr Journalist
Posting Date: 2021-07-30
Publish Date: 2021-07-29 

148) 9 Ransomware Enablers - And Tactics for Combating Them
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-08-05
Publish Date: 2021-07-29 

149) The First Step In Making Security a Top Priority
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Mark Roberts, CMO @ TPx Communications
Posting Date: 2021-07-01
Publish Date: 2021-07-28 

150) Why BGP Hijacking Just Won't Die
Source: Dark Reading
Category:Security
Author: Seth Rosenblatt, Editor-in-Chief @ The Parallax
Posting Date: 2021-07-30
Publish Date: 2021-07-28 

151) Ransomware Gang Blackmatter Has Ties to Darkside, Revil Hackers
Source: CYBERSCOOP
Category:Security
Author: Tim Starks, Sr Editor
Posting Date: 2021-07-30
Publish Date: 2021-07-28 

152) Ransomware, Supply Chain Attacks Put Cyber Insurers on Notice
Source: CYBERSECURITY MAGAZINE
Category:Security
Author: David Jones, Reporter
Posting Date: 2021-07-30
Publish Date: 2021-07-28 

153) How 3 Critical Infrastructure Security Executives Manage Vulnerabilities
Source: CYBERSECURITY DIVE
Category:Security
Author: Samantha Ann Schwartz, Reporter
Posting Date: 2021-07-30
Publish Date: 2021-07-28 

154) From Stolen Laptop to Inside the Company Network
Source: Dolos Group
Category:Security
Posting Date: 2021-08-02
Publish Date: 2021-07-28 

155) 1 in 4 Security Teams Report to CIOs, But Would Benefit from CISO Leadership: Survey
Source: CIO DIVE
Category:Security
Author: Samantha Ann Schwartz, Reporter
Posting Date: 2021-07-28
Publish Date: 2021-07-27 

156) 7 Tenets of Zero Trust Explained
Source: CSO ONLINE
Category:Security
Author: Chris Hughes, CISO & Co-Founder @ Aquia
Posting Date: 2021-07-28
Publish Date: 2021-07-27 

157) Guarding Against Digital Risks in a Post-COVID World
Source: CPO MAGAZINE
Category:Security
Author: Jeremy Hendy, CEO @ Skurio
Posting Date: 2021-07-30
Publish Date: 2021-07-27 

158) Why CISA’s China Cyberattack Playbook is Worthy of Your Attention
Source: DATA CENTER KNOWLEDGE
Category:Security
Author: Maria Korolov, Emerging Technology Writer
Posting Date: 2021-08-01
Publish Date: 2021-07-27 

159) Ransomware: Average Ransom Payment Drops to $137,000
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-07-26
Publish Date: 2021-07-26 

160) These Are the Four Common DNS Attacks
Source: CISO Magazine
Category:Security
Posting Date: 2021-07-28
Publish Date: 2021-07-26 

161) Cryptocurrency Pump-and-Dump Schemes
Source: cnet
Category:Security
Posting Date: 2021-07-28
Publish Date: 2021-07-26 

162) Leading Threat to Industrial Security Is Not What You Think
Source: SECURITYWEEK
Category:Security
Author: Gordon Lawson, CEO @ NetAbstraction
Posting Date: 2021-08-02
Publish Date: 2021-07-26 

163) IoT Security Dangers Loom as Office Workers Return
Source: DATA BREACH TODAY
Category:Security
Author: Doug Olenick, News Editor
Posting Date: 2021-07-26
Publish Date: 2021-07-24 

164) Wake Up! Identify API Vulnerabilities Proactively
Source: THE HACKER NEWS
Category:Security
Author: Gene Spafford - Professor at Purdue, recognized expert in InfoSe
Posting Date: 2021-07-25
Publish Date: 2021-07-23 

165) Supply Chain Exploits - What Can Be Done?
Source: NATIONAL CIO REVIEW
Category:Security
Author: Dean Crutchfield, CEO & Founder @ 45 North Advisors
Posting Date: 2021-07-25
Publish Date: 2021-07-23 

166) Ransomware Attacks Evade Strong Cyber Defenses
Source: CPO MAGAZINE
Category:Security
Author: Alicia Hope, Technology & Cyper Journalist
Posting Date: 2021-07-26
Publish Date: 2021-07-23 

167) EU Takes Aim at Ransomware with Plans to Make Bitcoin Traceable
Source: CSO Online
Category:Security
Author: Michael Hill, UK Editor
Posting Date: 2021-07-26
Publish Date: 2021-07-23 

168) Top 6 Tips for Securing Your Passwords In 2021
Source: CYBERSECURITY MAGAZINE
Category:Security
Author: Matthew Stern, Technology Content Strategist @ Techfools
Posting Date: 2021-07-26
Publish Date: 2021-07-23 

169) Alert for Ransomware Attack Victims: Here's How to Respond
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-08-01
Publish Date: 2021-07-23 

170) Is Your SecOps Solution Keeping Up?
Source: SECURITYWEEK
Category:Security
Author: John Maddison, EVP Products & CMO @ Fortinet
Posting Date: 2021-07-25
Publish Date: 2021-07-22 

171) Reduce End-User Password Change Frustrations
Source: THE HACKER NEWS
Category:Security
Posting Date: 2021-07-25
Publish Date: 2021-07-22 

172) Engineers Need Cybersecurity Training, Too
Source: CIO DIVE
Category:Security
Author: Samantha Ann Schwartz, Associate Editor
Posting Date: 2021-07-25
Publish Date: 2021-07-22 

173) Bulletproof Your Enterprise Cybersecurity Against State-Sponsored Attacks
Source: CPO MAGAZINE
Category:Security
Author: Rakesh Soni, CEO @ Loginradius
Posting Date: 2021-07-26
Publish Date: 2021-07-22 

174) What Does It Take to Secure Containers?
Source: Dark Reading
Category:Security
Author: Robert Lemos, Contributing Writer
Posting Date: 2021-07-26
Publish Date: 2021-07-22 

175) Will Open Cybersecurity Standards (Finally) Take Off?
Source: SDX CENTRAL
Category:Security
Author: Jessica Lyons Hardcastle, Managing Editor
Posting Date: 2021-07-22
Publish Date: 2021-07-21 

176) What Is a Security Champion and Do You Need One?
Source: SECURITY BOULEVARD
Category:Security
Author: Randall Gibson, Director Product Management @ Shiftleft, Inc
Posting Date: 2021-07-22
Publish Date: 2021-07-21 

177) PrintNightmare: How to Check If Your Systems are Still Vulnerable
Source: SECURITY BOULEVARD
Category:Security
Author: Nozomi Networks Labs
Posting Date: 2021-07-22
Publish Date: 2021-07-21 

178) Zero Trust, We Must
Source: SECURITYWEEK
Category:Security
Author: Torsten George, Security Evangelist @ Absolute Software
Posting Date: 2021-07-25
Publish Date: 2021-07-21 

179) Risk-Based Vulnerability Management – Time to Move Away from the Whack-a-Mole Model
Source: CISO Magazine
Category:Security
Author: Doug Drew – Client Solutions Advisor, Americas, Optiv
Posting Date: 2021-07-25
Publish Date: 2021-07-21 

180) Mitigate Threats with Data Risk Assessments
Source: Cyber Security Hub
Category:Security
Author: Elizabeth Mixson, Managing Editor @ Intelligent Automation
Posting Date: 2021-07-26
Publish Date: 2021-07-21 

181) ISPs Spent $235 Million on Lobbying and Donations
Source: ARS TECHNICA
Category:Security
Author: Jon Brodkin, Sr IT Reporter
Posting Date: 2021-07-21
Publish Date: 2021-07-20 

182) EU Plans to Make Bitcoin Transfers More Traceable
Source: BBC
Category:Security
Posting Date: 2021-07-21
Publish Date: 2021-07-20 

183) 16-Year-Old Bug in Printer Software Gives Hackers Admin Rights
Source: BleepingComputer
Category:Security
Author: Sergiu Gatlan, Cybersecurity Reporter
Posting Date: 2021-07-21
Publish Date: 2021-07-20 

184) IT Defenses Fail to Prevent Ransomware Attacks: Report
Source: CIO DIVE
Category:Security
Author: Katie Malone, Assoc Editor
Posting Date: 2021-07-21
Publish Date: 2021-07-20 

185) 8 Biases that Will Kill Your Security Program
Source: CSO Online
Category:Security
Author: Jaikumar Vijayan, Technology Writer
Posting Date: 2021-07-26
Publish Date: 2021-07-20 

186) Seeking a Competitive Edge vs. Chasing Savings In the Cloud
Source: INFORMATIONWEEK
Category:Security
Author: Joao-Pierre S. Ruth, Senior Writer
Posting Date: 2021-07-19
Publish Date: 2021-07-19 

187) 27 Top SaaS Companies for Business
Source: INFOWORLD
Category:Security
Author: Bob Violino, Contributing Writer
Posting Date: 2021-07-19
Publish Date: 2021-07-19 

188) As Ransomware Surge Continues, Where Next for Government?
Source: GOVERNMENT TECHNOLOGY
Category:Security
Author: Dan Lohrman, CSO & Chief Strategist @ Security Mentor Inc.
Posting Date: 2021-07-18
Publish Date: 2021-07-18 

189) Wireless Penetration Testing: Wifite
Source: Hacking Articles
Category:Security
Author: Harshit Rajpal, Security Researcher @ VayamTech
Posting Date: 2021-07-18
Publish Date: 2021-07-17 

190) U.S. Needs A New Approach to Ransomware Response
Source: Healthcare IT News
Category:Security
Author: Gene Spafford - Professor at Purdue, recognized expert in InfoSe
Posting Date: 2021-07-18
Publish Date: 2021-07-16 

191) Explosion of 0-Day Exploits: The Bad News and the Good News
Source: HELPNET SECURITY
Category:Security
Author: Zeljka Zorz, Managing Editor
Posting Date: 2021-07-18
Publish Date: 2021-07-16 

192) Top 7 Cybersecurity Companies for 2021
Source: AITECHPARK
Category:Security
Posting Date: 2021-07-18
Publish Date: 2021-07-15 

193) A Different Take on The Short Tenure of the CISO
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: JC Gaillard, Managing Director @ Corix Partners
Posting Date: 2021-07-18
Publish Date: 2021-07-15 

194) Ohio Introduces Data-Privacy Bill
Source: STATE SCOOP
Category:Security
Author: Colin Wood, Managing Editor
Posting Date: 2021-07-21
Publish Date: 2021-07-15 

195) The Rise of Social Engineering and How XDR Can Help
Source: NETWORKDATAPEDIA
Category:Security
Author: Tony Fortunato, Sr Network Specialist @ The Technology Firm
Posting Date: 2021-08-02
Publish Date: 2021-07-15 

196) Basics Can Be the Best Answer to Stopping the Advance of Today’s Threats
Source: INFOSECURITY
Category:Security
Author: Daniel Addington, Ed Brown, & Mike Manrod, CISSP's
Posting Date: 2021-07-18
Publish Date: 2021-07-14 

197) What Can Government do as Cyber Insurance Costs Increase?
Source: GOVERNMENT TECHNOLOGY
Category:Security
Author: Jule Pattison-Gordon, Staff Writer
Posting Date: 2021-07-18
Publish Date: 2021-07-14 

198) It Takes More Than MFA to Beat Human Hacking
Source: HELPNET SECURITY
Category:Security
Author: Patrick Harr, CEO, Slashnext
Posting Date: 2021-07-14
Publish Date: 2021-07-13 

199) How Public Cybersecurity Companies Performed in 1H 2021
Source: SECURITY BOULEVARD
Category:Security
Author: Richard Stiennon, Chief Research Analyst @ IT-Harvest
Posting Date: 2021-07-15
Publish Date: 2021-07-13 

200) REvil: Ransomware Gang Websites Disappear From Internet
Source: BBC
Category:Security
Author: Joe Tidy, Cyber Reporter
Posting Date: 2021-07-15
Publish Date: 2021-07-13 

201) The Need for Zero Trust Workload Protection
Source: AITECHPARK
Category:Security
Author: Satya Gupta, CTO & Founder @ Virsec
Posting Date: 2021-07-18
Publish Date: 2021-07-13 

202) Cyber Security Is In Denial, That's Why It Needs the Lean Six Sigma Approach
Source: InformationSecurity Buzz
Category:Security
Author: Miles Tappin, VP Of EMEA @ Threatconnect
Posting Date: 2021-07-19
Publish Date: 2021-07-13 

203) Couple Lost £15,000 Crypto in a Scam. We Followed the Money
Source: CYBERNEWS
Category:Security
Author: Edvardas Mikalauskas, Sr Writer & Researcher
Posting Date: 2021-07-13
Publish Date: 2021-07-12 

204) How Organizations Can Establish True Visibility Using CASB and Zero Trust
Source: CyberProtection Magazine
Category:Security
Author: Kevin Schwarz
Posting Date: 2021-07-13
Publish Date: 2021-07-12 

205) AI and Cybersecurity: Making Sense of the Confusion
Source: Dark Reading
Category:Security
Author: Oleg Brodt, R&D Director @ Deutsche Telekom Innovation Labs
Posting Date: 2021-07-13
Publish Date: 2021-07-12 

206) Ransomware Landscape: REvil Is One of Many Operators
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-07-13
Publish Date: 2021-07-12 

207) Stopping 5 Popular Cybersecurity Exploitation Techniques
Source: HELPNET SECURITY
Category:Security
Author: Candid Wüest, VP, Cyber Protection Research, Acronis
Posting Date: 2021-07-14
Publish Date: 2021-07-12 

208) EDR (Alone) Won’t Protect Your Organization from Advanced Hacking Groups
Source: SC Magazine
Category:Security
Author: Derek B. Johnson, Sr Reporter
Posting Date: 2021-07-14
Publish Date: 2021-07-12 

209) The Changing Face of Security: From Network to Cloud
Source: Toolbox
Category:Security
Author: Oliver Tavakoli, CTO @ Vectra
Posting Date: 2021-07-15
Publish Date: 2021-07-12 

210) What You Need to Know About Ransomware Insurance
Source: INFORMATIONWEEK
Category:Security
Author: John Edwards, Technology Journalist
Posting Date: 2021-07-19
Publish Date: 2021-07-12 

211) Wireless Penetration Testing: BetterCap
Source: HACKING ARTICLES
Category:Security
Author: Harshit Rajpal, Associate Consultant @ KPMG India
Posting Date: 2021-07-14
Publish Date: 2021-07-11 

212) Cross Site Request Forgery
Source: GbHackers
Category:Security
Author: Gurubaran, PKI Security Engineer & Co-Founder @ Gbhackers
Posting Date: 2021-07-13
Publish Date: 2021-07-09 

213) Don’t Be a Ransomware Victim
Source: infoWorld
Category:Security
Author: David Linthicum, Chief Cloud Strategy Officer @ Deloitte
Posting Date: 2021-07-14
Publish Date: 2021-07-09 

214) REvil Victims are Refusing to Pay After Flawed Ransomware Attack
Source: BleepingComputer
Category:Security
Author: Lawrence Abrams, Creator & Owner @ BleepingComputer.
Posting Date: 2021-07-12
Publish Date: 2021-07-08 

215) Quantum-Resistant Encryption: The Time to Act is Now
Source: CYBERNEWS
Category:Security
Author: Pierluigi Paganini, CEO @ CYBHORUS
Posting Date: 2021-07-13
Publish Date: 2021-07-08 

216) 1 in 4 Employees Have Access to Accounts from Past Jobs
Source: INFOSECURITY
Category:Security
Posting Date: 2021-07-07
Publish Date: 2021-07-07 

217) Phishing Campaign Looks to Leverage Kaseya VSA Fears
Source: SC MAGAZINE
Category:Security
Author: Joe Uchill, Sr Reporter
Posting Date: 2021-07-07
Publish Date: 2021-07-07 

218) PrintNightmare Vulnerability Explained: Exploits, Patches, and Workarounds
Source: CSO Online
Category:Security
Author: Lucian Constantin, Sr Writer
Posting Date: 2021-07-12
Publish Date: 2021-07-07 

219) Security 101: The PrintNightmare Flaw
Source: Dark Reading
Category:Security
Author: Jai Vijayan, Technology Reporter
Posting Date: 2021-07-13
Publish Date: 2021-07-07 

220) Kaseya Attack: REvil Offers $70 Million Super Decryptor
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor
Posting Date: 2021-07-05
Publish Date: 2021-07-05 

221) Retro TryHhackMe Walkthrough
Source: Hacking Articles
Category:Security
Author: Pavandeep Singh, Security Researcher @ Hacking Articles
Posting Date: 2021-07-06
Publish Date: 2021-07-05 

222) Platform or Roaming FIDO2 Authenticators: Which One Is Right for Your Workforce?
Source: HELPNET SECURITY
Category:Security
Author: Alex Grinman, Architect @ Akamai Technologies
Posting Date: 2021-07-06
Publish Date: 2021-07-05 

223) Defend Yourself Against Ransomware and Cyberattack
Source: FAST COMPANY
Category:Security
Author: Merrill Warkentin, Professor Info Sys @ Mississippi State Univ
Posting Date: 2021-07-06
Publish Date: 2021-07-03 

224) Pentesting Toolkit for MITM, Spoofing, DOS, Sniffing
Source: Gbhackers
Category:Security
Author: Gurubaran KS, PKI Security Engineer @ Comodo Security
Posting Date: 2021-07-06
Publish Date: 2021-07-03 

225) The Secret to Building a Future-Proof Cyber Security Team
Source: COMPUTERWEEKLY
Category:Security
Author: Russ Kirby, CISO @ ForgeRock
Posting Date: 2021-07-04
Publish Date: 2021-07-02 

226) Why Automotive Cybersecurity Is Crucial for the Future
Source: CISO Magazine
Category:Security
Author: Alexander Klotz, Head Of Technical Center, Continental Automotiv
Posting Date: 2021-07-04
Publish Date: 2021-07-02 

227) Solar Winds Hackers Continue to Cause Grief
Source: Cyber Security Hub
Category:Security
Author: Lisa Morgan,, Big Data & AI Writer
Posting Date: 2021-07-05
Publish Date: 2021-07-02 

228) How Facial Recognition Solutions Can Safeguard the Hybrid Workplace
Source: HELPNET SECURITY
Category:Security
Author: Jau Huang, CEO, Cyberlink
Posting Date: 2021-07-06
Publish Date: 2021-07-02 

229) REvil's Ransomware Success Formula: Constant Innovation
Source: INFORISKTODAY
Category:Security
Author: Mathew J. Schwartz, Editor @ DataBreachToday & Europe
Posting Date: 2021-07-07
Publish Date: 2021-07-02 

230) The Changing Trends in Cyber Security
Source: InformationSecurity Buzz
Category:Security
Author: Julien Escribe, Partner @ ISG
Posting Date: 2021-07-07
Publish Date: 2021-07-02 

231) What Is Phishing and How Do You Prevent It?
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Chanakya Kyatham, Sr Digital Marketing Mgr @ Paraminfo Computer
Posting Date: 2021-07-04
Publish Date: 2021-07-01 

232) Resilience By Design: Microlearning
Source: HELPNET SECURITY
Category:Security
Author: Steve Buege, GM Security Awareness & Training @ Arctic Wolf
Posting Date: 2021-07-06
Publish Date: 2021-07-01 

233) Ignorance is Bliss — For Hackers
Source: Security Brief
Category:Security
Author: Woodrow Mosqueda, Bitglass
Posting Date: 2021-07-01
Publish Date: 2021-06-30 

234) Windows Admins Scrambling to Contain PrintNightmare Flaw Exposure
Source: SECURITYWEEK
Category:Security
Author: Ryan Naraine, Editor-At-Large
Posting Date: 2021-07-01
Publish Date: 2021-06-30 

235) How to Start Addressing Insider Threats
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: Isaac Kohen, VP of R&D @ Teramind
Posting Date: 2021-07-01
Publish Date: 2021-06-30 

236) Tabletop Exercises: Six Sample Scenarios
Source: CSO Online
Category:Security
Author: Josh Fruhlinger & Sarah D. Scalet, Reporters & Editors
Posting Date: 2021-07-04
Publish Date: 2021-06-30 

237) The Pros and Cons Of Privacy-Enhancing Technologies (PETs)
Source: Cyber Security Hub
Category:Security
Author: Elizabeth Mixson, Technology Reporter
Posting Date: 2021-07-05
Publish Date: 2021-06-30 

238) Covenant for Pentester: Basics
Source: HACKING ARTICLES
Category:Security
Author: Pavandeep Singh, Security Researcher @ AAA Technologies
Posting Date: 2021-06-30
Publish Date: 2021-06-29 

239) How to Conquer Synthetic Identity Fraud
Source: HELPNET SECURITY
Category:Security
Author: Carey O’Connor Kolaja, CEO, AU10TIX
Posting Date: 2021-06-30
Publish Date: 2021-06-29 

240) Staying on Guard Against Cyber-Attacks
Source: INFOSECURITY MAGAZINE
Category:Security
Author: John Fedoronko, VP Sales – EMEA, Reliaquest
Posting Date: 2021-06-30
Publish Date: 2021-06-29 

241) Introduction Into Insider Threat and Mitigation
Source: NETWORKCOMPUTING
Category:Security
Author: David Balaban, Cybersecurity Expert, Journalist, Editor
Posting Date: 2021-06-30
Publish Date: 2021-06-29 

242) Neuberger: Banning Ransom Payments Is a Difficult Policy Position
Source: SC Magazine
Category:Security
Author: Joe Uchill, Sr Security Reporter
Posting Date: 2021-07-01
Publish Date: 2021-06-29 

243) Navigating the Complexity of Ransomware Negotiations
Source: HELPNET SECURITY
Category:Security
Author: Leeann Nicolo, Incident Response Lead, Coalition
Posting Date: 2021-06-30
Publish Date: 2021-06-28 

244) Be More Resilient Against Ransomware
Source: INFOSECURITY MAGAZINE
Category:Security
Author: Robert Capps, VP Emerging Technologies @ Nudata Security
Posting Date: 2021-06-30
Publish Date: 2021-06-28 

245) Wireless Penetration Testing: Detect Hidden SSID
Source: HACKING ARTICLES
Category:Security
Author: Harshit Rajpal, Associate Consultant @ KPMG India
Posting Date: 2021-06-30
Publish Date: 2021-06-27 

246) Protecting the Software-Defined Vehicle
Source: CPO MAGAZINE
Category:Security
Author: Jada Smith, Global Engineering Director @ Aptiv
Posting Date: 2021-06-28
Publish Date: 2021-06-25 

247) Sn1per - Automated Information Gathering & Penetration Testing
Source: GbHackers
Category:Security
Author: BALAJI, Editor in Chief
Posting Date: 2021-06-29
Publish Date: 2021-06-25 

248) Cyberattacks Shine Spotlight on Operational Technology Vulnerabilities
Source: CYBERSECURITY MAGAZINE
Category:Security
Author: Fred Gordy, Director Cyber Security @ Intelligent Buildings
Posting Date: 2021-06-29
Publish Date: 2021-06-25 

249) Critical Software - Definition & Explanatory Material
Source: NIST
Category:Security
Posting Date: 2021-06-30
Publish Date: 2021-06-25 

250) 7 Unconventional Pieces of Password Wisdom
Source: Dark Reading
Category:Security
Author: Ericka Chickowski, Contributing Writer
Posting Date: 2021-07-05
Publish Date: 2021-06-25 

251) Business Email Compromise: The Most Common Threat Vector
Source: CISO Magazine
Category:Security
Author: GreatHorn
Posting Date: 2021-06-24
Publish Date: 2021-06-24 

252) Ransomware Attacks Fall as Gangs Focus on Lucrative Targets
Source: INFOSECURITY MAGAZINE
Category:Security
Author: James Coker, Reporter
Posting Date: 2021-06-24
Publish Date: 2021-06-24 

253) XDR Is a Destination, Not a Solution
Source: SECURITYWEEK
Category:Security
Author: Marc Solomon, Chief Marketing Officer @ Threatquotient
Posting Date: 2021-06-27
Publish Date: 2021-06-24 

254) Most Third-Party Libraries are Never Updated After Being Included
Source: HELPNET SECURITY
Category:Security
Author: Chris Wysopal, CTO @ Veracode
Posting Date: 2021-06-24
Publish Date: 2021-06-23 

255) Self-Healing Cybersecurity Systems: A Pipe Dream or Reality?
Source: SECURITYWEEK
Category:Security
Author: Torsten George, Security Evangelist @ Absolute Software
Posting Date: 2021-06-27
Publish Date: 2021-06-23 

256) The Security Risk of Fragmented Identities: Dealing with the Dangers of Identity Sprawl
Source: CONTINUITY CENTRAL
Category:Security
Author: Kamel Heus Is VP EMEA @ Thycoticcentrify
Posting Date: 2021-06-28
Publish Date: 2021-06-23 

257) Data Obfuscation: The Linchpin of Enterprise Data Security
Source: Cyber Security Hub
Category:Security
Author: Elizabeth Mixson, Managing Editor @ Intelligent Automation
Posting Date: 2021-06-28
Publish Date: 2021-06-23 

258) Three Cyber Security Roles Today's Enterprises Need
Source: Cyber Security Hub
Category:Security
Author: Lisa Morgan, CEO @ Strategic Rainmakers
Posting Date: 2021-06-28
Publish Date: 2021-06-23 

259) When Will Cybersecurity Operations Adopt the Peter Parker Principle?
Source: Dark Reading
Category:Security
Author: Robert Boudreaux Field CTO @ Deep Instinct
Posting Date: 2021-07-05
Publish Date: 2021-06-23 

260) 7 Best Practices for Enterprise Attack Surface Management
Source: CSO Online
Category:Security
Author: Shannon Flynn, Technology Writer
Posting Date: 2021-06-24
Publish Date: 2021-06-22 

261) Best Practices for IT Teams to Prevent Ransomware Attacks
Source: HELPNET SECURITY
Category:Security
Author: Chandra Basavanna, CEO, SecPod Technologies
Posting Date: 2021-06-24
Publish Date: 2021-06-22 

262) 7 Best Practices for Enterprise Attack Surface Management
Source: CSO Online
Category:Security
Author: Shannon Flynn, Technology Writer
Posting Date: 2021-06-27
Publish Date: 2021-06-22 

263) Three Lessons CISOs Can Learn from the SolarWinds Cyberattack
Source: CISO Magazine
Category:Security
Author: Dick Bussiere, Technical Director, APAC, Tenable
Posting Date: 2021-06-28
Publish Date: 2021-06-22 

264) CISA: Firewall Rules Could Have Blunted SolarWinds Malware
Source: DATA BREACH TODAY
Category:Security
Author: Jeremy Kirk, Managing Editor, Security And Technology
Posting Date: 2021-06-29
Publish Date: 2021-06-22 

265) 7 Ways Technical Debt Increases Security Risk
Source: CSO ONLINE
Category:Security
Author: John Edwards, Technology Journalist
Posting Date: 2021-06-21
Publish Date: 2021-06-21 

266) How Cyber Safe is Your Drinking Water Supply?
Source: KREBS ON SECURITY
Category:Security
Author: Brian Krebs, Investigative Reporter
Posting Date: 2021-06-22
Publish Date: 2021-06-21 

267) Attacks Against Container Supply Chains Grow More Sophisticated
Source: CyberSecurity Dive
Category:Security
Author: David Jones, Reporter
Posting Date: 2021-06-22
Publish Date: 2021-06-21 

268) The One, Two, Three of Cyber Threat Detection
Source: CyberSecurity Magazine
Category:Security
Author: Mark Harrison, Head Of Cyber Security @ MTI
Posting Date: 2021-06-22
Publish Date: 2021-06-21 

269) How Technological Convenience Necessitates Cybersecurity Awareness
Source: CPO MAGAZINE
Category:Security
Author: Apu Pavithran, CEO & Founder @ Hexnode
Posting Date: 2021-06-24
Publish Date: 2021-06-21 

270) How Technological Convenience Necessitates Cybersecurity Awareness
Source: CPO MAGAZINE
Category:Security
Author: Apu Pavithran, CEO & Founder @ Hexnode
Posting Date: 2021-06-27
Publish Date: 2021-06-21 

271) Risk Based Vulnerability Management – Let’s Begin with the “Why?”
Source: CISO Magazine
Category:Security
Author: Doug Drew, Client Solutions Advisor, Americas, Optiv
Posting Date: 2021-06-21
Publish Date: 2021-06-19 

272) 60% Organizations Consider Ransom Payment
Source: CISO Magazine
Category:Security
Posting Date: 2021-06-21
Publish Date: 2021-06-18 

273) How Hackers Are Building Data Fountains Through Webscraping
Source: Cyber Protection Magazine
Category:Security
Author: Interview With Karolis Toleikis, CEO @ Iproyal
Posting Date: 2021-06-21
Publish Date: 2021-06-18 

274) Law Enforcement's Cybercrime Honeypot Maneuvers Paying Off
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Editor @ DataBreachToday & Europe
Posting Date: 2021-06-22
Publish Date: 2021-06-18 

275) 4 Habits of Highly Effective Security Operators
Source: Dark Reading
Category:Security
Author: Ricardo Villadiego, CEO & Founder @ Lumu Technologies
Posting Date: 2021-06-29
Publish Date: 2021-06-18 

276) As Ransomware Business Booms, Can Defenders Keep Up?
Source: SDX CENTRAL
Category:Security
Author: Jessica Lyons Hardcastle, Managing Editor
Posting Date: 2021-06-20
Publish Date: 2021-06-17 

277) Active Directory Certificate Services a Big Security Blindspot
Source: CSO ONLINE
Category:Security
Author: Lucian Constantin, Sr Writer
Posting Date: 2021-06-21
Publish Date: 2021-06-17 

278) IoT Technology Will Always Improve but It Will Never Be 100% Secure
Source: CISO Magazine
Category:Security
Author: Chukwudum Chukwudebelu, CSO @ Simius Technologies Inc.
Posting Date: 2021-06-24
Publish Date: 2021-06-17 

279) Most Firms Face Second Ransomware Attack After Paying Off First
Source: ZDNET
Category:Security
Author: Eileen Yu, Technology Journalist
Posting Date: 2021-06-17
Publish Date: 2021-06-16 

280) How to Create a Post-Pandemic Data Security RFP
Source: SECURITYWEEK
Category:Security
Author: Tim Bandos, CISO @ Digital Guardian
Posting Date: 2021-06-17
Publish Date: 2021-06-16 

281) The 3 Biggest Mistakes the Board Can Make Around Cyber Security
Source: BUSINESS 2 COMMUNITY
Category:Security
Author: JC Gaillard, Managing Director @ Corix Partners
Posting Date: 2021-06-17
Publish Date: 2021-06-16 

282) Trade Secret Protection Rapidly Rising Up the Corporate Agenda
Source: Security Brief
Category:Security
Author: Shannon Williams, Writer
Posting Date: 2021-06-20
Publish Date: 2021-06-16 

283) Wireless Penetration Testing: Password Cracking
Source: Hacking Articles
Category:Security
Author: Harshit Rajpal, Security Researcher @ VayamTech
Posting Date: 2021-06-22
Publish Date: 2021-06-16 

284) To Identify Cybersecurity Vendor Sustainability, Start with the Fundamentals
Source: HELPNET SECURITY
Category:Security
Author: Reuven Aronashvili, CEO @ CYE
Posting Date: 2021-06-16
Publish Date: 2021-06-15 

285) Six Key Characteristics Of A Modern ZTNA Solution
Source: Security Brief
Category:Security
Author: Jonathan Andresen, Sr Director Marketing @ Bitglass
Posting Date: 2021-06-16
Publish Date: 2021-06-15 

286) Experts Shed Light on Distinctive Tactics Used by Hades Ransomware
Source: THE HACKER NEWS
Category:Security
Author: Ravie Lakshmanan, Cybersecurity & Privacy Journalist
Posting Date: 2021-06-17
Publish Date: 2021-06-15 

287) C-Suites Adapt to Ransomware as a Cost of Doing Business
Source: SC Magazine
Category:Security
Author: Jill Aitoro, Editor In Chief
Posting Date: 2021-06-20
Publish Date: 2021-06-15 

288) How is Automation Helping in Security?
Source: CISO Magazine
Category:Security
Author: Avesta Hojjati, Head Of R&D @ Digicert
Posting Date: 2021-06-14
Publish Date: 2021-06-14 

289) Avaddon Ransomware Operation Call it Quits, Releases Keys
Source: DATA BREACH TODAY
Category:Security
Author: Mathew J. Schwartz, Executive Editor,
Posting Date: 2021-06-15
Publish Date: 2021-06-14 

290) How an App to Decrypt Criminal Messages Was Born ‘Over a Few Beers’ with the FBI
Source: GCN
Category:Security
Author: David Tuffley, Sr Lecturer Cybersecurity @ Griffith University
Posting Date: 2021-06-15
Publish Date: 2021-06-14 

291) Wireless Penetration Testing: Fern
Source: HACKING ARTICLES
Category:Security
Author: Harshit Rajpal, Associate Consultant @ KPMG India
Posting Date: 2021-06-15
Publish Date: 2021-06-14 

292) Observability: The Foundation of Zero-Trust Networks
Source: GCN
Category:Security
Author: Willie Hicks, Federal CTO @ Dynatrace
Posting Date: 2021-06-15
Publish Date: 2021-06-14 

293) 54% of Senior Executives Struggling to Keep Up with Threat Landscape
Source: INFOSECURITY MAGAZINE
Category:Security
Author: James Coker Reporter
Posting Date: 2021-06-16
Publish Date: 2021-06-14 

294) Fighting Half-Blind Against Ransomware Won't Work
Source: Dark Reading
Category:Security
Author: Michael Daniel, CEO @ Cyber Threat Alliance
Posting Date: 2021-06-22
Publish Date: 2021-06-14 

295) What Is the Future of Cybersecurity? Depth Cyber Space Analysis
Source: GbHackers
Category:Security
Author: Rebecca James, Cybersecurity Journalist
Posting Date: 2021-06-15
Publish Date: 2021-06-13 

296) US Army Assets Hacked by Crack Team of 40 Operatives
Source: Forbes
Category:Security
Author: Davey Winder, Technology Journalist
Posting Date: 2021-06-14
Publish Date: 2021-06-12 

297) New Cyber Espionage Group Targeting Ministries of Foreign Affairs
Source: THE HACKER NEWS
Category:Security
Author: Ravie Lakshmanan, Cybersecurity & Privacy Journalist
Posting Date: 2021-06-13
Publish Date: 2021-06-11 

298) Linux System Service Bug Lets You Get Root
Source: BleepingComputer
Category:Security
Author: Sergiu Gatlan, Cybersecurity Reporter
Posting Date: 2021-06-13
Publish Date: 2021-06-11 

299) Quantum Computing is Imminent, and Enterprises Need Crypto Agility Now
Source: HELPNET SECURITY
Category:Security
Author: Todd Moore, VP Encryption Solutions, Thales
Posting Date: 2021-06-13
Publish Date: 2021-06-11 

300) Is the FBI Winning the Crime War?
Source: BBC
Category:Security
Author: Rory Cellan-Jones, Technology Correspondent
Posting Date: 2021-06-14
Publish Date: 2021-06-11 


0 Articles Added in the Last 7 Days
20,492 Articles with 17,726 subscribers
4,758 C-Level and 11,642 LinkedIn Connections


“The only system which is truly secure is one which is switched off and unplugged locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it.”
- Gene Spafford - Professor at Purdue, recognized expert in InfoSec/Cybersecurity -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. We harvest and compile 40+ of the absolute best technical articles with no pop-up ads or sales angles. We address everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header

Tech Top6

Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com