By Joanna Sobran, President and CEO of MXOtech Most employees, 91% that is, want to stay working remote — at least to some degree — for the foreseeable future, and 76% say that their employers are on board with this approach. It makes sense: Operational data has made it clear […]

Remote Resiliency: The Importance Of Robust Backup And Disaster Recovery


In the new report “Addressing the Modern Enterprise Authentication Challenge,” experts with TAG Cyber Research and Veridium analyze the benefits of enterprise migration to modern authentication methods and establishing trusted digital identities, along with best practices to guide the migration. Security concerns are one of the top reasons for migrating […]

Modern Enterprise Authentication – Drivers and Best Practices for Migrating ...


Data security is a major concern for businesses and individuals alike. There are a number of different ways to encrypt data, but one of the most convenient is to use an encrypted flash drive. iStorage recently provided Brilliance Security Magazine with a datAshur SD encrypted flash drive to test and […]

iStorage datAshur SD



By Ashley Nielsen Everyone is vulnerable to cyber-attacks. Businesses can be hacked at any point, giving hackers information to customer data, such as credit card numbers. However, individuals can also be hacked at any point, with hackers gaining access to bank accounts and social security numbers, allowing them to steal […]

How to Protect your Laptop from Cyber Attacks


By Joe Agee, Area Manager for Automation and Software at Rockwell Automation Several high-profile cyber attacks in recent years have put a spotlight on growing levels of cybersecurity risk in the automotive sector. The industry needs to quickly increase awareness of the current attack surface, which is often through the […]

4 Installed Base Vulnerabilities in Automotive Cybersecurity


By Sriram Kakarala, Vice President of Products, ProMobi Technologies Addressing data security concerns has been a top priority for enterprises and their IT teams. However, remote and perimeter-less working environments have made it difficult to provide security; since employees, corporate devices, and data no longer are safeguarded within the conventional […]

Endpoint management and security and its growing importance in mitigating ...



By Paul Nicholson, Senior Director, Product Marketing at A10 Networks. The world has been battling the COVID-19 pandemic for the last several years, and threat actors have taken advantage of the disruption to ramp up cyber-attacks at an accelerated rate. We are slowly transitioning to a more normal operating environment. […]

Tracking the Sources of DDoS Weaponry; Preventing DDoS Attacks from ...


By Nicolas Ponce, Vice President of Operations & Security, Addigy With cybersecurity attacks on the rise, your organization may be the next victim. No matter the size of your organization, your systems and networks are at risk. A well-thought-out incident response (IR) plan can help you with minimizing damage while […]

Your Incident Response Plan in 2022: What Should It Include?


By Corey Nachreiner, CSO at WatchGuard Technologies Do you remember Coinbase’s mysterious Super Bowl ad? The moving QR code on a plain black background with no other information was intended to make viewers curious and lure them into scanning the QR code.  While this might have been a clever marketing idea, […]

Cybersecurity Ramifications of Mainstream QR/AR Codes



Apps are Increasingly Crucial to Businesses, But Their Security Remains Underfunded. By Peter R. Kelley In “The State of Mobile App Security in 2022,” Osterman Research and mobile app API experts Approov reveal significant vulnerabilities and security concerns with production mobile apps, and in particular, with the APIs that these […]

Mobile Apps: Open for Business, Open to Attack


By Jeff Broth Over the past decade, the fields of cybersecurity and hacking have developed at incredible rates, much in response to one another. Whenever there is a major breakthrough within hacking communities that starts to show up around the world, it is similarly defended against, with the world’s cybersecurity […]

Where Does Breach and Attack Simulation Come From?


High-growth security awareness training and behavior modification company offers channel partners the best opportunities to keep their clients safe from cyberattacks. LOS ANGELES, CA (July 13, 2022) — Leading security awareness training (SAT) company NINJIO is announcing the launch of its NINJIO Partner Program, which will give integrators, consultancies, value-added […]

NINJIO Partner Program Enables Solution Providers to Deliver Cybersecurity Behavior ...