Digital assistants, fitness trackers, home security devices, thermostats, remote-controlled robots, gaming systems, and talking stuffed animals … What these things all have in common is that they send and receive data. But do you know where it is going?

FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned

October 7, 2020 – In Breaking News – Forbes Warnings that our IoT devices might be spying on us are nothing new—remember the smart speaker fiasco last year? But at least we expect those devices...
Security begins at the input device – stay protected from keyloggers and BadUSB attacks with the SECURE BOARD 1.0 from CHERRY. With the new CHERRY SECURE BOARD 1.0, accessing sensitive credentials and passwords will be impossible for hardware keyloggers, as keys are entered in encrypted form.

CHERRY Grows it’s US Base with Executive Promotions & Input Devices

Developments such as digitization and Big Data and the exponentially growing mountains of data that go hand in hand with them are stirring a desire for more. Not only for cybercriminals who...
Bad actors are targeting governments, schools, and other public institutions with extra venom. Ransomware is proving to be such a problem for the public sector primarily because of the rise of third-party cloud channels: social media tools, messaging apps, and collaboration platforms.

To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels

Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....

7 Data Loss Prevention Strategies and Practices You Should Know

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
Brinqa Cyber Risk Services intelligently connect security, asset and threat data from all relevant sources to measure, prioritize, remediate and manage cyber risk. The solution provides a truly open data model and completely configurable risk scoring methodology. (Courtesy of Brinqa)

Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards

Brinqa™, a leader in Cyber Risk Management recognized in 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce that Brinqa Cyber Risk Services and Brinqa Vulnerability Risk Service have been nominated...

Funding Op for ‘Cyber Solutions for Energy Infrastructure’

The U.S. Department of Energy (DOE), the Israel Ministry of Energy, and the Israel Innovation Authority are seeking Proposals from the U.S.-Israel Center of Excellence in Energy, Engineering and Water Technology...
Nightfall ai logo

5 Common Accidental Sources of Data Leaks

In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or account takeovers,...
Carnival Corp says it suffered a ransomware attack on Saturday, August 15, and that hackers stole some of its data.

World’s Largest Cruise Line Operator Suffers Ransomware Attack

Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain of Carnival’s data...
Following the acquisition, the Depth Security team will round-out All Covered’s current defensive offering to include offensive capabilities to support market share growth.

Konica Minolta Adds Depth Security to Provide Holistic IT Security Offering

Konica Minolta Business Solutions, a Four-Time 2019 'ASTORS' Homeland Security Awards Winner, together with its IT Services division, All Covered, has acquired Depth Security, a cybersecurity consulting company that enhances the...
As attacks have grown in complexity, the need for defenders to employ effective automation has also increased, and cybersecurity teams have sought to respond accordingly by investing in tools that help eliminate the manual work associated with incident detection, analysis, and response.

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response

Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 'ASTORS' Awards Cybercrime is always evolving, and as technology becomes more advanced, so too do...