By Nils Gerhardt, Chief Technology Officer for Utimaco The ‘Internet of Things’ (or IoT) is far…
Categoría: it security
Auto Agregado por WPeMatico
Red Cross Red Flags: The Human Repercussions of Cyberattacks
By Tim Wallen, UK and Ireland Regional Director, Logpoint Many expected the war in Ukraine to…
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology…
There’s No Place for Guesswork in Cyber-Attack Investigations
Accelerating Incident Response with Digital Forensics By Harsh Behl, Director of Product Management, Exterro Responding To…
Log4j Showed Us That Public Disclosure Still Helps Attackers.
Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25…
Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance
Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer,…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance…
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift…
Are You Prepared for the New Normal of Jekyll and Hyde Data?
An organization’s data and secrets are simultaneously its greatest assets and its greatest risks. By Howard…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept…