Tag: Network Security
-
66 Million Users Personal Data Exposed From Unprotected MongoDB
Newly discovered unprotected MongoDB database exposed around 66 Million users records with different chapters and collection of data that …
-
Endpoint Management Missteps in the ‘Die Hard’ Franchise: Viewing a Holiday Favorite Through a Cybersecurity Lens
“Die Hard” is likely the greatest Christmas movie of all time — especially when viewed from an endpoint management perspective. …
-
5 Recommendations to Improve Retail Cybersecurity This Holiday Season
With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for businesses …
-
How to Prepare for the Coming 5G Security Threats
Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is …
-
Hacking Your Home
So, I’ve been looking a little deeper into what I have running on my network over the past day or so, and I found a few interesting things. …
-
Most Important Consideration of Confidentiality,Integrity, Availability (CIA Triad) to Avoid Organization Data Breach
It is not wrong to say that information is power in today’s fast changing competitive world. The one who has right information at the …
-
Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform
Last year, a cybersecurity manager at a bank near me brought in a user behavior analytics (UBA) solution based on a vendor’s pitch that …
-
2019 Israeli Security Expo Promises to Deliver Solutions to New-Age Threats
Israel leads the pack when it comes to combating emerging threats. Considering most modern nations are susceptible to these threats, this …
-
Why You Should Start Leveraging Network Flow Data Before the Next Big Breach
Organizations tend to end up in cybersecurity news because they failed to detect and/or contain a breach. Breaches are inevitable, but …
-
Triton Malware Spearheads Latest Generation of Attacks on Industrial Systems
Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber …
-
Complexity is the Worst Enemy of Security, Time for a New Approach with Network Security?
Ultimately, by overcomplicating network security for far too long, the industry has failed – which won’t come as a surprise to many. …
-
Hacker Leaked Unpatched Virtual Box Zero-day Vulnerability and its Exploit Online
Russian Security Expert leaked a critical Virtual Box Zero-day vulnerability online along with its exploit that allows an attacker to gain …
●●●