Saturday, November 18, 2017

CloudCodes: BRINGING BACK THE PROVIDER – CUSTOMER RELATIONSHIP IN CLOUD SECURITY

CloudCodes was founded in the year 2011 with a lot of focus aimed at customer interaction and taking into consideration their feedback, in order...

Rivetz: Away With User-based Security, In With Device-based Protection

Recent findings published by Cybersecurity Ventures, a firm that delivers cybersecurity market data and insights, indicate that in 2017, the global cybersecurity market is...

From the White House server room to your company’s front door...

The success (or failure) of a company to protect digital data is a window into the soul of cybersecurity today. Why do bad things happen...

IIoT Wireless Cybersecurity

Most Industrial Internet of Things (IIoT) applications will utilize some type of wireless communication network for transmitting data collected by sensors to host systems....

Vendor Management: It’s a Risky Business

Just like exercising and getting sufficient sleep, we often discuss managing our vendors, suppliers and partners better. However, industry surveys continue to show a...

HBO’s Silicon Valley Foreshadows Possible Federal Storyline

Recently, HBO’s hit series Silicon Valley made reference to the once-esoteric FIPS 140-2 validation process for encryption. In the show, the massive Hooli juggernaut...

A life of (cyber) crime

It seems as if cybercrime is in the mainstream media more and more often these days – and with good reason, if not an...

The emerging cyber landscape

By Barry Barlow, Senior VP & CTO, Vencore, Inc. “You've got to ask yourself one question. Do I feel lucky?” As the delineation between cybercrime and...

Pay the ransom, and then pay some more: Security teams should...

By Carl Herberger, Vice President of Security, Radware When a movie character is kidnapped, paying the ransom doesn’t always result in the hostage’s release. Quite...