Blog

What the FedEx Logo Taught Me About Cybersecurity

What the FedEx Logo Taught Me About Cybersecurity

Cyber threats are staring you in the face, but you can't see them.


8 June, 2021 Matt Shea

The Role of Visibility in Securing Cloud Applications

Hunter-Gatherers in the Cybersecurity Jungle

Why complementing your SOC's ongoing CTI efforts with advanced threat-hunting analytics is a vital strategy for ensuring cyber resilience.


4 May, 2021 Gilad Zahavi

The Role of Visibility in Securing Cloud Applications

The Role of Visibility in Securing Cloud Applications

Traditional data center approaches aren't built for securing modern cloud applications.


5 April, 2021 Praveen Patnala

Cybercrime 'Help Wanted': Job Hunting on the Dark Web

Power Equipment: A New Cybersecurity Frontier

Power systems, HVAC systems, and other network-connected devices are exposing new vulnerabilities that must be secured.


16 March, 2021 Hervé Tardy

Cybercrime 'Help Wanted': Job Hunting on the Dark Web

Cybercrime 'Help Wanted': Job Hunting on the Dark Web

How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work -- and which skills are hot right now.


3 March, 2021 Joan Goodchild

100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020

100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020

Consumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.


16 February, 2021 Jai Vijayan

Improving Your Enterprise's Protection With Cyber Resilience

Improving Your Enterprise's Protection With Cyber Resilience

In the face of unprecedented global challenges and the rise of cybercrime, here are five points for boosting your organization's cyber resilience.


3 February, 2021 Stan Wisseman

Attackers Leave Stolen Credentials Searchable on Google

Attackers Leave Stolen Credentials Searchable on Google

Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.


22 January, 2021 Kelly Sheridan

Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor

Cybersecurity Ethics: Establishing a Code for Your SOC

Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work.


13 January, 2021 Koen Van Impe

Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor

Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor

A combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats.


6 January, 2021 Joel Wallenstrom

Ransomware Increasingly Targeting Small Governments

2021 Cybersecurity Predictions: The Intergalactic Battle Begins

There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.


23 December, 2020 Pieter Danhieux

Ransomware Increasingly Targeting Small Governments

The Private Sector Needs a Cybersecurity Transformation

Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.


17 December, 2020 Steve Ryan

Companies Fall Short on Mandatory Reporting of Cybercrimes

Companies Fall Short on Mandatory Reporting of Cybercrimes

Understaffed and under fire, companies fail to report cybercrimes even when they are legally obligated to notify authorities, results of a new survey show.


3 June, 2020 Robert Lemos

Ransomware Increasingly Targeting Small Governments

Ransomware Increasingly Targeting Small Governments

To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.


12 March, 2020 Robert Lemos

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

Let's Talk: Why Language Matters in Cybersecurity

Like the latest security tools on the RSAC show floor, how we choose to communicate about the latest cyberthreats and more can play a key role in improving the security for all on the Internet.


21 February, 2020 Karen Burke

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

Cybersecurity Lessons Learned from 'The Rise of Skywalker'

They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.


25 January, 2020 Matt Davey

Cybercrime's Most Lucrative Careers

Cybercrime's Most Lucrative Careers

Security professionals recommend technology to detect attacks that have already infiltrated a network.


08 January, 2020 Joan Goodchild

The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem

Defensive Wish List for 2020: Faster Responses to Threats

Security professionals recommend technology to detect attacks that have already infiltrated a network.


30 December, 2019 Robert Lemos

The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem

The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem

By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.


9 December, 2019 Lysa Myers

A Cause You Care About Needs Your Cybersecurity Help

A Cause You Care About Needs Your Cybersecurity Help

By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.


29 November, 2019 Joan Goodchild

What's in a WAF

What's in a WAF?

Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.


21 November, 2019 Sara Peters

9 Principles to Simplify Security

9 Principles to Simplify Security

This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.


11 November, 2019 Menny Barzilay

The Cybersecurity Skill Shortage Epidemic

Improving Big Data Analytics To Address Cybersecurity Challenges

It's important to work on improving big data analytics in order to address cybersecurity challenges and threats. Here's why it's important.


25 October, 2019 Jonathan Zhang

The Cybersecurity Skill Shortage Epidemic

The Cybersecurity Skill Shortage Epidemic

The gap between the threat capability of modern-day attacks and the skilled personnel able to mitigate them, is perpetually widening. Technology is one way to close the gap.


16 October, 2019 Guy Caspi

7 Disastrous Cybersecurity Mistakes In A Big Data World

7 Disastrous Cybersecurity Mistakes In A Big Data World

There are many cybersecurity mistakes to be aware of int his big data word we're living in. Here are a few very important ones to watch out for.


07 October, 2019 Sean Mallon

Cybersecurity Certification in the Spotlight Again

Cybersecurity Certification in the Spotlight Again

Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.


30 September, 2019 Robert Lemos

Preventing PTSD and Burnout for Cybersecurity Professionals

Preventing PTSD and Burnout for Cybersecurity Professionals

The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.


17 September, 2019 Craig Hinkley

How To Improve Cybersecurity With Data Science

Hackers & Artificial Intelligence: A Dynamic Duo

To best defend against an AI attack, security teams will need to adopt the mindset and techniques of a malicious actor.


10 September, 2019 Nadav Maman

How To Improve Cybersecurity With Data Science

How To Improve Cybersecurity With Data Science

Here's how you can improve cybersecurity with data science to aim for more secure data.


30 August, 2019 Matt James

A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips

Stronger Defenses Force Cybercriminals to Rethink Strategy

Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.


19 August, 2019 Kelly Sheridan

A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips

Capital One: What We Should Learn This Time

Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.


05 August, 2019 Kelly Sheridan

A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips

A Lawyer’s Guide to Cyber Insurance: 4 Basic Tips

The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.


20 July, 2019 Beth Burgin Waller

How to Create Smarter Risk Assessments

How to Create Smarter Risk Assessments

Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks.


01 July, 2019 Terry Sweeney

DNS Firewalls Could Prevent Billions in Losses to Cybercrime

DNS Firewalls Could Prevent Billions in Losses to Cybercrime

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.


17 June, 2019 Curtis Franklin Jr.

True Cybersecurity Means a Proactive Response

4 Tips to Protect Your Business Against Social Media Mistakes

Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or cause huge reputational damage.


23 April, 2019 Guy Bunker

True Cybersecurity Means a Proactive Response

True Cybersecurity Means a Proactive Response

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.


10 April, 2019 Liron Barak

How to Create a Dream Team for the New Age of Cybersecurity

Inside Cyber Battlefields, the Newest Domain of War

In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.


30 March, 2019 Kelly Sheridan

How to Create a Dream Team for the New Age of Cybersecurity

Machine Learning Makes VPNs Excellent Options For Cybersecurity

When considering your options for cybersecurity, you'll want to think about using VPNs. They're an excellent possible thanks to machine learning.


11 March, 2019 Diana Hope

How to Create a Dream Team for the New Age of Cybersecurity

How to Create a Dream Team for the New Age of Cybersecurity

When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.


19 February, 2019 Gaurav Banga

2018's Most Common Vulnerabilities Include Issues New and Old

The most common vulnerabilities seen last year run the gamut from cross-site scripting to issues with CMS platforms.


21 January, 2019 Curtis Franklin Jr.

By 2020, 60 percent of digital businesses will suffer major service interruptions

The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.


7 January, 2019 Marc Wilczek

Cybersecurity in 2019: From IoT & Struts to Gray Hats & Honeypots

While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.


22 December, 2018 Phillip Maddux

A Shift from Cybersecurity to Cyber Resilience: 6 Steps

Getting to cyber resilience means federal agencies must think differently about how they build and implement their systems. Here's where to begin.


10 December, 2018 Gus Hunt

Cybersecurity at the Core

For too long, cybersecurity has been looked at as one team's responsibility. If we maintain that mentality, we will fail.

Leaders around the globe are not naive regarding the impact cyberattacks have on a business.


26 November, 2018 Troy Mattern

Tackling Cybersecurity from the Inside Out

It's no secret that ransomware and distributed denial-of-service attacks are on the rise. In fact, compared with the previous year, the average number of targeted cyberattacks per organization in 2017 more than doubled (232 through January 2018 versus 106 through January 2017).


07 November, 2018 Marc Wilczek

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources provided in the policies make the investment worthwhile.


31 October, 2018 Blair Shiver

War of the digital worlds: A day in the life of a threat intelligence analyst

If a company or individual is powerful, they are vulnerable to a dangerous cyber attack, and that's where we come in.


17 October, 2018 Alex Hinchliffe

Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit

The analysis of file systems is a fundamental step in every forensic investigation. Long-known file systems such as FAT, NTFS, or the ext family are well supported by commercial and open source forensics tools.


24 September, 2018 Cyber Forensicator

US Approves Cyber Weapons Against Foreign Enemies

The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.

The Trump administration has authorized the use of "offensive cyber operations" against foreign enemies.


24 September, 2018 Dark Reading

WhatsApp: Mobile Phishing's Newest Attack Target

In 2018, mobile communication platforms such as WhatsApp, Skype, and SMS have far less protection against app-based phishing than email.

Mobile phishing is a topic that just won't go away.


24 September, 2018 Dan Cuddeford

Copyright © 1996 - 2023 ZOOM CyberSense. All Rights Reserved.