
The dynamic of modern security challenges: Issues security leaders face today
We sat down with Neil Weicher, CTO & Founder, NetLib Security, to discuss encryption technologies, the threat of legacy applications, the complexity of cloud security, …

The rise of biometrics and passwordless security
Whether you realize it or not, our current era of mobile and cloud computing can be defined, both positively and negatively, by shared secrets. Shared secrets — passwords, …

How to increase the efficiency of your risk and compliance management strategy
The rise of new business processes and the changing government rules and regulations around the globe are posing challenges for small and big companies alike, according to …

SD-WAN continues to be one of the fastest-growing segments of the network infrastructure market
The SD-WAN infrastructure market will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN …

Week in review: Crafty Office 365 phishing, how DNS firewalls can burn security teams
Here’s an overview of some of last week’s most interesting news and articles: Phishers targeting Office 365 admins have a new trick up their sleeve Phishers …

Ransomware attack leaves Johannesburg residents without electricity
A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While …

Damaging insider threats rise to new highs in the past year
70 percent of organizations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely …

The need for scalable OT security
As manufacturers and other industrial network owners are becoming more security conscious, they are coming up against security performance issues. Operational Technology (OT) …

New infosec products of the week: July 26, 2019
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault Centrify’s Free Tier Vault is available immediately in the AWS Marketplace, …

Current methods for anonymizing data leave individuals at risk of being re-identified
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …

Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …

100% of IT execs are modernizing architectures, but struggling with data silos and vendor lock-in
99% of IT execs report challenges with architecture modernization and 98% report challenges with their corporate data architectures (data silos), a DataStax survey reveals. …