Crowdsourced pentesting is not without its issues

Crowdsourced security isn’t new anymore, having existed in one form or another as a consumable enterprise service since 2013 with the launch of the main crowdsourced platforms (HackerOne, Bugcrowd and Synack). Slowly but surely, these platforms challen… Continue reading Crowdsourced pentesting is not without its issues

Personal data protection today: We should demand more

The growing number of cybersecurity incidents reported each year – and the fact that many attacks remain unreported for security and PR reasons – can leave even the most experienced security professionals worrying about threats to user data… Continue reading Personal data protection today: We should demand more

The cybersecurity implications of working remotely

We sat down with Demi Ben-Ari, CTO at Panorays, to discuss the cybersecurity risks of remote work facilitated by virtual environments. The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organization… Continue reading The cybersecurity implications of working remotely

Overcoming crypto assessment challenges to improve quantum readiness

Large enterprises have a major problem when it comes to preparing for the advent of quantum computing: few, if any, have a working knowledge of all the locations where cryptographic keys are being stored and used across applications, browsers, platform… Continue reading Overcoming crypto assessment challenges to improve quantum readiness

Increase web application security without causing any user disruption

In this podcast recorded at RSA Conference 2020, Jason A. Hollander, CEO, and Paul B. Storm, President at Cymatic, talk about how their platform builds a defensible barrier around the user, so web-based threats can be stopped at the source. Here’s a tr… Continue reading Increase web application security without causing any user disruption

Some commercial password managers vulnerable to attack by fake apps

Security experts recommend using a complex, random and unique password for every online account, but remembering them all would be a challenging task. That’s where password managers come in handy. Encrypted vaults are accessed by a single master … Continue reading Some commercial password managers vulnerable to attack by fake apps

Security is leaving the data center and moving to the edge

The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete. A 2019 study by research firm Gartner found that “more users, devices, applicati… Continue reading Security is leaving the data center and moving to the edge

Healthcare cybersecurity in the time of coronavirus

Brno University Hospital, in Brno, Czech Republic, which is one of the country’s Covid-19 testing centers, has recently been hit by a cyberattack. The nature of the attack has yet to be shared, but looks like it might be ransomware. The result? S… Continue reading Healthcare cybersecurity in the time of coronavirus

Playing the infinite game with threat intelligence and cyber fusion

“We can know only that we know nothing. And that is the highest degree of human wisdom.” ― Leo Tolstoy, War and Peace. True wisdom, as Leo Tolstoy remarked, lies in acknowledging the fact that there will always be forces beyond our control and anticipa… Continue reading Playing the infinite game with threat intelligence and cyber fusion

Why ransomware continues to knock on healthcare’s door, enter, and create havoc

My name is Adam, and I’ve worked in the healthcare industry for over 15 years. In my current line of work, I assist healthcare facilities across the U.S. with their overall cybersecurity posture, ranging from physical and technical security controls to… Continue reading Why ransomware continues to knock on healthcare’s door, enter, and create havoc