Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.
In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data…
5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond…
Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to defend against attacks from the outside, zero trust assumes that threats are ubiquitous and pervasive. Therefore, each user, device, and application within your network must verify that…
SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house…
A group of technology luminaries have launched an effort to find and train a new generation of cybersecurity talent, an effort that will gain steam tomorrow with The Cyber Talent CIO Forum. The event is free and open to the public, and that’s central to the group’s goal, which is to find talent in new…
Last year, the Supreme Court ruled that the Civil Rights Act of 1964—which has historically applied to race, color, religion, sex, and national origin—also protects gay and transgender workers. This landmark ruling means members of the LGBTQ+ community cannot be discriminated against in hiring, firing, and promotion decisions. But the absence of discrimination doesn’t mean…
The RSA Conference’s Innovation Sandbox Contest has been a source of new ideas and approaches for an ever-evolving cybersecurity industry for 16 years. This year’s contest was no different, as startup founders and leaders made their pitches from around the world. From agentless solutions for multi-cloud infrastructures to implementing zero trust and threat scoring, the…
In the biggest cyberattack to date on critical infrastructure in the U.S., Colonial Pipeline – sprawling 5,500 miles from Houston to New York City – halted its mainlines on Friday, May 7, when administrators detected advanced ransomware internally. On Thursday, a day before the ransomware attack, Russia-based cyber criminal group DarkSide stole more than 100GB…
NFT-mania, pronounced nifty, is upon us with little time to prepare. From news of a collage selling for almost $70 million at Christie’s auction house to a portrayal of Janet Yellen and Morpheus rapping about cryptocurrency on SNL, the current craze is all about non-fungible tokens (NFTs). But what are NFTs, how do they work,…
Alexa skills are growing in popularity as users look to extend the capabilities of their Alexa devices. Researchers now believe that the rapid adoption of these skills could have implications for information security as they could open Alexa users up to phishing or invasive data collection What is an Amazon Alexa skill? An Amazon Alexa…