Category: CyberSecurity-Insiders

Insights from the cybersecurity trenches: Security is essential as a defensive strategy, but it’s also good for business
27
Jul
2023

Insights from the cybersecurity trenches: Security is essential as a defensive strategy, but it’s also good for business

By Justin Haney, North America Cybersecurity Lead, Avanade We all know cybersecurity protects data and assets and provides risk mitigation,…

Settling for the bare minimum is jeopardising your business’ cyber safety
27
Jul
2023

Settling for the bare minimum is jeopardising your business’ cyber safety

By Guy Golan, Co-Founder and CEO at Performanta The way in which businesses approach cybersecurity and implement defence strategies is…

Top 7 ecommerce cybersecurity threats and tips to avoid them
27
Jul
2023

Top 7 ecommerce cybersecurity threats and tips to avoid them

The ecommerce industry is on the rise. According to Statista, global ecommerce sales amounted to approximately $5.2 trillion. Moreover, experts…

Beyond the IP Address: Regaining Visibility into Atomized Networks
27
Jul
2023

Beyond the IP Address: Regaining Visibility into Atomized Networks

Dan Ramaswami, Vice President of Field Engineering, Netography  The atomized network is defined by its dispersed, ephemeral, encrypted, and distributed…

Data Security firm Imperva to be acquired by Thales for $3.5 billion
27
Jul
2023

Data Security firm Imperva to be acquired by Thales for $3.5 billion

France based company Thales, that is into the business segment of aerospace and defense has made an official statement that…

User Awareness Training: A Critical Component to Collaboration Tool Security
27
Jul
2023

User Awareness Training: A Critical Component to Collaboration Tool Security

By Sean Brady, Mimecast VP of Product Management In addition to email, collaboration tools are now a focal point of…

From Vulnerability to Vigilance: How Mobile App Evolution Influenced Security Mindsets
26
Jul
2023

From Vulnerability to Vigilance: How Mobile App Evolution Influenced Security Mindsets

By Jon Samsel, senior vice president of global marketing at Verimatrix (www.verimatrix.com) There are a lot of savvy CISOs that…

From Vulnerability to Vigilance: How Mobile App Evolution Influenced Security Mindsets
26
Jul
2023

From Vulnerability to Vigilance: How Mobile App Evolution Influenced Security Mindsets

By Jon Samsel, senior vice president of global marketing at Verimatrix (www.verimatrix.com) There are a lot of savvy CISOs that…

Future careers: how to make it in biometrics
26
Jul
2023

Future careers: how to make it in biometrics

[ This article was originally published here ] A career in biometrics means changing the future. Your work can have…

How social media compromises information security
26
Jul
2023

How to improve employee phishing awareness

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Google limits internet access to employees to save them from Cyber Attacks
26
Jul
2023

Cyber Attack news headlines trending on Google

Temu, the Chinese e-commerce platform specializing in clothing and electronic accessories, is currently facing scrutiny from a US watchdog due…

Cyber Attack on Norway govt websites identified to Ivanti Security vulnerability
26
Jul
2023

Cyber Attack on Norway govt websites identified to Ivanti Security vulnerability

A few days ago, several of the websites operated by Norwegian government were disrupted because of a possible cyber-attack. US-CISA…