Aegis Secure Key 3NXC a Finalist in 2020 ‘ASTORS’ Awards Program
Even before the COVID-19 pandemic, remote and mobile working was on the rise.
As the global workforce shifted from office to home practically overnight, it became abundantly clear that workers would...
FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned
October 7, 2020 – In Breaking News – Forbes
Warnings that our IoT devices might be spying on us are nothing new—remember the smart speaker fiasco last year?
But at least we expect those devices...
CHERRY Grows it’s US Base with Executive Promotions & Input Devices
Developments such as digitization and Big Data and the exponentially growing mountains of data that go hand in hand with them are stirring a desire for more.
Not only for cybercriminals who...
To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels
Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber
Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....
7 Data Loss Prevention Strategies and Practices You Should Know
Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO
Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
Pandemic Response – How to Set up Temporary Gigabit Wireless Access Networks
Implementing a wireless network to establish or expand broadband communications services in emergency situations (health, weather, natural disaster related or other) can be a tricky endeavor.
Requirements include replacing the capacity lost...
5 Common Accidental Sources of Data Leaks
In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events.
Bad actors are easy to blame for information leaks or account takeovers,...
Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response
Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 'ASTORS' Awards
Cybercrime is always evolving, and as technology becomes more advanced, so too do...
Fight the Germs – Discover How to Keep a Hygienic Work Space
Since the beginning of time, people have been disgusted by certain things.
From an evolutionary-biological point of view, this makes sense.
A healthy disgust preserved and still preserves people today from carelessly putting...
Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide
Guest Editorial by Eddie Segal
The number of remote workers grew substantially since the World Health Organization officially declared Covid-19 a pandemic on March 11.
Within a few weeks, an estimated 16...