5 minutes with Nick McKenzie – The state of cybersecurity in financial services

5 minutes with Nick McKenzie – The state of cybersecurity in financial services

5 minutes with Nick McKenzie – The state of cybersecurity in financial services | 2021-08-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Ground truth in the financial threat landscape

Ground truth in the financial threat landscape

Ground truth in the financial threat landscape | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

End-to-end encryption and securing data

End-to-end encryption and securing data

End-to-end encryption and securing data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Attackers help victims pay their ransoms, even offer tips to prevent future attack

Attackers help victims pay their ransoms, even offer tips to prevent future attack

Attackers help victims pay their ransoms, even offer tips to prevent future attack | 2021-08-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Using Threat Modeling to Boost Your Incident Response Strategy

Using Threat Modeling to Boost Your Incident Response Strategy

Threat modeling is increasing in importance as a way to plan security in advance. Instead of merely reacting to threats and incidents, an organization can identify and evaluate its security posture, relevant threats, and gaps in defenses that may allow attacks to succeed. Threat modeling has a two-way relationship with incident response: When an attack happens, incident responders can benefit tremendously from a threat model that shows them which attack vectors are likely to impact…

Read More

Embed Security into Your Modernized Applications

Embed Security into Your Modernized Applications

By Gadi Naor, CTO and Co-Founder of Alcide Companies may be feeling pressure to modernize their legacy, monolithic applications for many reasons: some may wish to operate on a larger scale or to increase innovation velocity by enabling teams to work in parallel. Some companies will build new applications from the ground up, and others will take an incremental approach to modernization by breaking up their monolithic applications and creating modernized blocks one piece at…

Read More

Chinese Government Will Begin to Stockpile Zero-Days in September

Chinese Government Will Begin to Stockpile Zero-Days in September

By Randy Reiter CEO of Don’t Be Breached July 2021 has Been A Busy Month in Cyber Security The Associated Press published on Tuesday, July 13, 2021 that on September 1, 2021 a new law in China requires all Chinese citizens finding a Zero-Day Vulnerability to provide within 48 hours the details to the Chinese government. A Chinese citizen must NOT give or sell the information to third parties outside of China (apart from the…

Read More

Schools, colleges brace for cyberattacks as students return

Schools, colleges brace for cyberattacks as students return

Hackers are ready to pounce on schools and universities as they attempt to restart classes 18 months into the coronavirus pandemic while already dealing with controversial subjects such as mask mandates and hybrid learning. Both K-12 schools and colleges have been increasingly subjected to ransomware attacks, class interruptions on virtual learning platforms, phishing emails and identity theft, further disrupting an already challenging learning environment. “Last year was quite rough,” Doug Levin, the national director of…

Read More

Four Ways Smart Cities Can Stay Safe in An Interconnected World

Four Ways Smart Cities Can Stay Safe in An Interconnected World

Mitigating the risks of cyber threats through cyber intelligence and frontier technologies By Ritesh Kumar, Chairman & CEO, CYFIRMA Smart cities bring about an abundance of benefits for a nation – a more liveable space for citizens, a thriving business environment, and greater economic growth. It is therefore no surprise that world leaders and nations are focused on developing critical infrastructure and rolling out technologies to build up their own smart cities. However, with the…

Read More

Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G

Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G

By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, widespread botnet activity, and some of the largest DDoS attacks ever recorded. As COVID-19 drove an urgent shift online for everything from education and healthcare, to consumer shopping, to office work, hackers had more targets available than ever—many of them under protected due to the…

Read More
1 2,197 2,198 2,199 2,200 2,201 2,656