informa

Commentary

Should Hacking Have a Code of Conduct?
For white hats who play by the rules, here are several ethical tenets to consider.
September 26, 2022
For white hats who play by the rules, here are several ethical tenets to consider.
by Haris Pylarinos, Founder and CEO, Hack The Box
September 26, 2022
4 MIN READ
Article
Neglecting Open Source Developers Puts the Internet at Risk
From creating a software bill of materials for applications your company uses to supporting open source projects and maintainers, businesses need to step up their efforts to help reduce risks.
September 23, 2022
From creating a software bill of materials for applications your company uses to supporting open source projects and maintainers, businesses need to step up their efforts to help reduce risks.
by Lorna Mitchell, Head of Developer Relations, Aiven
September 23, 2022
5 MIN READ
Article
Twitter's Whistleblower Allegations Are a Cautionary Tale for All Businesses
Businesses need to turn privacy and security into an advantage. Store less data, and live up to customer expectations that their information is protected. Take small steps, be transparent about data management, and chose partners carefully.
September 22, 2022
Businesses need to turn privacy and security into an advantage. Store less data, and live up to customer expectations that their information is protected. Take small steps, be transparent about data management, and chose partners carefully.
by Stephen Manley, Chief Technology Officer, Druva
September 22, 2022
5 MIN READ
Article
Don't Wait for a Mobile WannaCry
Attacks against mobile phones and tablets are increasing, and a WannaCry-level attack could be on the horizon.
September 21, 2022
Attacks against mobile phones and tablets are increasing, and a WannaCry-level attack could be on the horizon.
by Richard Melick, Director of Mobile Threat Intelligence, Zimperium
September 21, 2022
4 MIN READ
Article
Ransomware: The Latest Chapter
As ransomware attacks continue to evolve, beyond using security best practices organizations can build resiliency with extended detection and response solutions and fast response times to shut down attacks.
September 21, 2022
As ransomware attacks continue to evolve, beyond using security best practices organizations can build resiliency with extended detection and response solutions and fast response times to shut down attacks.
by Daniel Clayton, Vice President, Global Security Services and Support, Bitdefender
September 21, 2022
5 MIN READ
Article
How to Dodge New Ransomware Tactics
The evolving tactics increase the threat of ransomware operators, but there are steps organizations can take to protect themselves.
September 20, 2022
The evolving tactics increase the threat of ransomware operators, but there are steps organizations can take to protect themselves.
by Oliver Rochford, Director of Applied Research, Securonix
September 20, 2022
4 MIN READ
Article
Water Sector Will Benefit From Call for Cyber Hardening of Critical Infrastructure
A call for federal agency "review and assessment" of cyber-safety plans at water treatment plants should better protect customers and move the industry forward.
September 20, 2022
A call for federal agency "review and assessment" of cyber-safety plans at water treatment plants should better protect customers and move the industry forward.
by Duncan Greatwood, CEO, Xage
September 20, 2022
4 MIN READ
Article
Cyberattack Costs for US Businesses up by 80%
Cyberattacks keep inflicting more expensive damage, but firms are responding decisively to the challenge.
September 19, 2022
Cyberattacks keep inflicting more expensive damage, but firms are responding decisively to the challenge.
by Marc Wilczek, Digital Strategist & COO, Link11
September 19, 2022
4 MIN READ
Article
Business Application Compromise & the Evolving Art of Social Engineering
Be wary of being pestered into making a bad decision. As digital applications proliferate, educating users against social engineering attempts is a key part of a strong defense.
September 16, 2022
Be wary of being pestered into making a bad decision. As digital applications proliferate, educating users against social engineering attempts is a key part of a strong defense.
by Jonathan Hencinski, Vice President of Security Operations, Expel
September 16, 2022
4 MIN READ
Article
5 Best Practices for Building Your Data Loss Prevention Strategy
The entire security team should share in the responsibility to secure sensitive data.
September 15, 2022
The entire security team should share in the responsibility to secure sensitive data.
by Richard Kanadjian, Encrypted USB Business Manager, Kingston Technology
September 15, 2022
4 MIN READ
Article
To Ease the Cybersecurity Worker Shortage, Broaden the Candidate Pipeline
With enough passion, intelligence, and effort, anyone can be a successful cybersecurity professional, regardless of education or background.
September 14, 2022
With enough passion, intelligence, and effort, anyone can be a successful cybersecurity professional, regardless of education or background.
by Joshua Scott, Head of Information Security and IT, Postman
September 14, 2022
4 MIN READ
Article
Name That Toon: Shiver Me Timbers!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
September 13, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
September 13, 2022
1 MIN READ
Article
Business Security Starts With Identity
How identity-centric security can support business objectives.
September 13, 2022
How identity-centric security can support business objectives.
by Josephina Fernandez, Senior Director of Enterprise Security, Cisco
September 13, 2022
4 MIN READ
Article
Security Awareness Training Must Evolve to Align With Growing E-Commerce Security Threats
Users must continually be made aware of new threats, including attacks targeting shipping, the supply chain, email, and hybrid workers.
September 12, 2022
Users must continually be made aware of new threats, including attacks targeting shipping, the supply chain, email, and hybrid workers.
by Bruno Farinelli, Fraud Analytics Manager, ClearSale
September 12, 2022
4 MIN READ
Article
Why Ports Are at Risk of Cyberattacks
More docked ships bring a new challenge. The longer a ship is docked, the more vulnerable the port is to a cyberattack.
September 09, 2022
More docked ships bring a new challenge. The longer a ship is docked, the more vulnerable the port is to a cyberattack.
by Aviv Grafi, CTO and Co-Founder, Votiro
September 09, 2022
4 MIN READ
Article