Browsing Category
Cybersecurity
Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platform
Microsoft has observed a proliferation of adversary-in-the-middle (AiTM) techniques deployed through phishing-as-a-service (PhaaS)…
Four in Five Cyber-Attacks Powered by Just Three Malware Loaders
Cybersecurity provider ReliaQuest observed that cyber-criminals used seven different malware loaders to deploy their intrusion…
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside…
The Industrial Control Systems and The Internet of Things
By Milica D. Djekic
The industrial control systems (ICS) are usually the part of critical infrastructure to every country or…
The Billion Dollar Problem: Securing Business Communication in the…
By Anurag Lal, President and CEO of NetSfere
Securing business communication in the financial services industry is now more than…
A Cloud Security Conundrum: Protecting Your Company from Third-Party…
By Vrinda Khurjekar, Senior Director, AMER business, Searce
The sky is the limit for cloud migration as Gartner predicts that…
Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident…
Cloud and SaaS have become the new nexus for today’s cyber attackers. Are you ready to respond to a breach? Enter Mitiga:…
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a…
SaaS Application Security: Why It Matters and How to Get It Right
Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures
By Babar Khan Akhunzada, Founder,…
Our Risk Perception Is Broken How Do We Fix It?
By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent
I was first introduced to the concept of cyber…