Loading...

Follow Cyber Defense Magazine on Feedspot

Continue with Google
Continue with Facebook
or

Valid
By Amelia Blanche Privacy is an aspect that is increasingly valued when it comes to surfing the Internet but is increasingly difficult to achieve. User data is too valuable for companies and is used in a multitude of network activities. For this reason, virtual private networks or VPNs are gaining prominence in forced marches by […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Collaborates with google developers to hunt online predators By Brendon S Brady, Executive Director, CHCSociety We are happy to announce that in the coming months we will be releasing an app. This app, in short, will give real-time access for law enforcement to our chat logs and hunters. I hope, this real-time access will cut […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
By Chris Bates, VP of Security Strategy, SentinelOne   Every city and government organization should assume they are a ransomware target. Attacks like the ones in Atlanta, Baltimore and Rivera Beach are about more than just criminal payouts – they’re paralyzing attacks that can bring a city to its knees, as we’re seeing. A lack of cybersecurity resources, maintenance and updates across broad […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Many companies have a false sense of confidence about their cybersecurity capabilities By Doug Ramos, Security Practice Manager, Groupware Technology Facing ever-evolving malware, vulnerabilities and hacking attempts, companies today need to seriously look at and evaluate their cyber security policies. Studies show a vast number of businesses of all kinds seem to be woefully unprepared […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the Solid State Drives (SSD) for Data Centers (DC). Intel’s Patch Tuesday security updates for July 2019 address a serious flaw in the Processor Diagnostic Tool and another issue in the Solid State Drives (SSD) for […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
If you want to switch to a career in cybersecurity, this is how you can get started By Ehtisham Hussain, Content Marketing Manager, QuickStart At the time this article is being written, there are more than 35,000 cybersecurity jobs posted on indeed.com, out of which more than 5000 were posted within the last 48-72 hours. […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
Roots at  the college level By DRP; Cybersecurity Lab Engineer The InfoSec field and industry continue to grow at an outstanding pace. This is being driven by many market forces, including the increase in attacks, malware being released into the wild, phishing, and spear phishing being promulgated by the attackers. From the technical side, there […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Operatively-sourced intelligence signaled the rise of petya ransomware as early as January 2017… A game of cyber “cat and mouse” on a global level. By Byron Rashed, Vice President of InfoArmor, Inc. By the end of June 2017, the Petya ransomware and its variants had infected devices in 65 countries. The scope, severity, and speed […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

By Chris Olson, CEO of The Media Trust Malvertising, a combination of malware and advertising, has more than doubled in the past three years and is increasingly found on premium websites that are typically whitelisted by enterprises for employee internet use. Malvertising is typically spread via legitimate digital advertising services and packs a nasty, unexpected […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
A new application for old attack                                                                                      By DRP; Cybersecurity Lab Engineer Vehicle security […]
Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview