Roses Are Red(Line): Why Credential-Stealing Malware is Giving SOC Teams the Blues
Credential-stealing malware is a growing threat, bypassing security tools to steal credentials and session cookies. Learn how SOC teams can enhance visibility and implement strategies to stop attackers in their tracks. | SPYCLOUD...
Immersive Experiences Usher in the Future of Medical Training and Education
Immersive technologies like AR and VR are transforming medical education, enabling interactive, cost-effective training that enhances learning and improves patient care. | LENOVO...
What the Growing Need for Cybersecurity Awareness Means for Your Career
Rising cyberattacks emphasize the need for cybersecurity awareness. Organizations are investing in training to build security cultures, creating new career opportunities. | THE H LAYER...
How to Navigate the Virtual CISO (vCISO) Market Strategically
Explore the vCISO market to tackle cybersecurity challenges strategically. Choose providers that fit your needs, enhance risk management, and boost resilience without a full-time CISO commitment. | DIGITAL HANDS...
Security in Cloud Applications | SOFTWARE SECURE
The last few years have seen a massive shift in cloud security challenges, requiring organizations to implement new strategies to secure cloud applications. | SOFTWARE SECURE...
How Hospitals of the Future Can Deliver More Convenient and Connected Patient Experiences | LENOVO
Hospitals can improve patient experiences if they embrace technology for more connected and comfortable experience. Think easy check-in, virtual consultations and more. | LENOVO...
How AI Chatbots Like ChatGPT Could Impact Jobs
AI's ability to automate tasks previously perfomed by humans has been impressive over the recent years. As chatbot technology advances, the question of whether they can replace humans arises. | DASHLANE...
Guide to Critical Infrastructure Cybersecurity
As critical infrastructure organizations undergo digital transformation to improve efficiency and reliability, they must also be aware of new vulnerabilities and cyber security threats. | ROCKWELL AUTOMATION...
How Passwordless Authentication Could Impact Your Day-to-Day Life
Passwordless authentication is gaining popularity because it offers higher security and a more seamless user experience. How could this impact your day-to-day life? | DASHLANE...
The Hidden Costs of Ransomware Attacks
Ransomware attacks have far-reaching implications beyond financial costs, including brand reputation, personnel, and SOC personnel, and should be addressed with better visibility and automation. | SPYCLOUD...
How to Reduce Churn and Cut Costs with a Cloud-Based Platform
Customer churn is a growing and expensive problem for communications service providers (CSPs). To win in today’s hyper-competitive industry, CSPs need to rethink their customer experience. | PLUME...
Stolen Passwords and Ransomware Attacks: What Businesses Can Do Right Now
The prevalence of ransomware attacks in the news would compel any business leader or IT admin to ask: Could we be next? You can do one big thing to make it harder for ransomware attackers: Lock down your credentials. | DASHLANE...
Shining a Light on the Identity Exposure of Fortune 1000 and FTSE 100 Enterprises
The pandemic propelled the digital age forward and workplaces went hybrid, with employees juggling a growing number of logins. But employees’ bad passwords habits didn’t change, leaving organizations more exposed than ever. | SPYCLOUD...
Spearphishing meets vishing: New multi-step attack targets corporate VPNs
Bad actors have adapted their tactics to leverage the COVID-19 pandemic, especially the remote work environment. One of the latest tactics is a spearphishing attack and a vishing attack rolled into one. | INFOSEC...
BEC attacks: A business risk your insurance company is unlikely to cover
Business email compromise (BEC) attacks are costly, and the threat escalates as online activity grows. Despite growing awareness, organizations continue to fall victim to clever social engineering tactics cybercriminals use. | INFOSEC...
Japan’s IoT Scanning Project Looks for Vulnerable IoT Devices
Connected toasters or light bulbs may not come first to mind in matters of national security, but as Japan prepared for the 2020 Summer Olympics, the government created a plan to scan its citizens’ IoT devices for weaknesses. | INFOSEC...
Ransomware Attacks on French Hospitals Shows Unrelenting Threat to Healthcare Sector
Ransomware attacks pummeled the healthcare industry in 2020, and the trend continues in 2021 with a rash of attacks. French hospitals are the latest example.| DASHLANE...
How the Hack at a Florida Water Treatment Plant Affects All Organizations in the Public Sector
A hack at the water treatment plant in Florida is an opportunity for critical infrastructure agencies to reevaluate their approach to organizational security. | DASHLANE...
Security Reimagined — Solving an Old Problem with a New Approach
Security pros need to challenge conventional wisdom — that every new threat vector requires adding new tools and methodologies (and consequently, more people) to protect across users, devices, apps, and networks. | CISCO SECURITY...
Are You Going About the Talent Shortage Wrong? It’s Time to Stop MacGyvering
As MacGyver used to say, "There always seems to be a way to fix things.” But are organizations trying to fix the wrong things in security? | CISCO SECURE...
How Secure Are Your Cybersecurity Tools?
Before you deploy a cybersecurity solution, you should ensure that the tool you plan to use is secure itself. One easy way to do that is through third-party ratings from companies such as SecurityScorecard. | DASHLANE...
Which states have the toughest privacy laws?
The United States lags behind other developed countries in protecting consumer privacy — it only has a patchwork of federal privacy laws, primarily aimed at specific sectors like healthcare and financial sectors. | INFOSEC...
Artificial intelligence and machine learning trends
From protecting endpoints to detecting online fraud, the cybersecurity sector finds wide uses for artificial intelligence and machine learning. | INFOSEC...
Top 4 industries for cybersecurity jobs
You can find a job just about anywhere as a cybersecurity analyst, engineer, or any other number of cybersecurity specialties, but some industries are more attractive than others. | INFOSEC...
The difference between AI and machine learning
Some people use the terms “artificial intelligence” and “machine learning” interchangeably, but they’re not the same thing. | INFOSEC...
Employees Working from Home? Why Cybersecurity Is More Important Than Ever
During the COVID-19 pandemic, many employers transitioned their teams to work from home. From a security perspective, organizations face a double whammy. | ARCTIC WOLF...
Why Shadow IT Could Create Major Issues for Your Remote Workforce
Shadow IT could spell disaster for your business when you consider growing risks such as unsecured home connections and remote access technology. | ARCTIC WOLF...
The Honda Cyber attack Highlights Growing Problems for Manufacturers
The recent attack that paralyzed operations at Honda demonstrates manufacturing organizations are being tracked and hunted and becoming a specific mark. | ARCTIC WOLF...
7 Email Security Tips Everyone Should Know
With email demanding so much of our attention, it's no wonder cyber criminals use to carry out all sorts of nefarious activities. | ARCTIC WOLF...
Are Corporate Meeting Trends Changing Due to the Experience Economy?
In the experience economy, meeting planners want new, creative ways to engage their audiences — a good meeting outcome, after all, is all about the attendee experience. | CVENT...
Latest in Style: Modern Meeting Room Designs
Open-space design has become mainstream in the workplace over the last decade, but it can make collaboration a challenge. Traditional meeting rooms simply don’t solve that challenge for today’s agile workforce. | CORT...
7 Elements of a Successful Security Awareness Training Program
As cybersecurity experts often like to say, humans are the weakest link in an organization’s security. Technology can only go so far in protecting data and other assets, but the end-users can always undo the best of defenses. | INFOSEC...
What Your Compliance Officer Should Know About Privacy
An audit can help to identify gaps in processes and overall security posture as well as uncover any privacy compliance issues that will need to be addressed in order to avoid penalties. | INFOSEC INSTITUTE...
Critical Components of Implementing a Successful Security Champions Program
Organizations focused on creating a security culture are looking for new, innovative ways to create security awareness and inspire employees at all levels to take ownership of security. | INFOSEC...
How to Create Thought Leadership Content
Brands looking to differentiate themselves use thought leadership to present new ideas, educate customers and prospects, and influence buyer behavior. | IZEA...
Artificial Intelligence Content Marketing
Creativity is at the heart of content marketing, but creative content marketing is no longer exclusively the domain of humans. | IZEA...