Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
The Cyber Risks Of Non-Compliance
70% of UK Finance Industry Hit With Cyber-Attacks...
A Chinese Hacking Group Is Stealing Airline Passenger...
Expert Commentary: Hacker Posts 1.9 Million Pixlr User...
NSA And Dutch NCSC Warn Outdated TLS Certs
Federal Agency Warns Cloud Attacks Are On The...
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

Security Articles

Cybersecurity Awareness Month 2020: Key Insights From Industry Experts

Security Experts October 1, 2020
Staying Cyber Safe in Industry
Read Security Article

World War 2020 – The Kind War

Professor John Walker October 1, 2020
Beware the Missing Patch
Read Security Article

Tackling The Security Challenges Of A New Remote Working Reality

Paul Wooldridge September 30, 2020
Tackling The Security Challenges Of A New Remote Working Reality
Read Security Article

What You Need To Know About Zerologon

Chris Goettl September 30, 2020
Windows Encryption Keys Could Expose Users to Hackers
Read Security Article

Three Steps To Manage Third-party Risk In Times Of Disruption

Patrick Potter September 28, 2020
Three Steps To Manage Third-party Risk In Times Of Disruption
Read Security Article

Cloud Adoption – Is It Even A Choice Anymore?

Mary Treseler September 28, 2020
Cloud Adoption – Is It Even A Choice Anymore?
Read Security Article

Strategy Roadmap for CIS Control #1: Inventory and Control of Hardware Assets

Dr. Muhammad Malik September 25, 2020
security of their data
Read Security Article

The Role Of Geospatial Data In Cybersecurity

Devin Partida September 24, 2020
The Role Of Geospatial Data In Cybersecurity
Read Security Article

Digital Inclusion: What Does It Bring To The Future Of Connected Vehicles?

Alexander Moiseev September 23, 2020
Hacking vulnerability
Read Security Article

Tackling Open Source Security For Faster Innovation

Robert Former September 21, 2020
Tackling Open Source Security For Faster Innovation
Read Security Article

Fraudsters Capitalise On Fear, Uncertainty And Doubt During The Pandemic

David Emm September 21, 2020
Fraudsters Capitalise On Fear, Uncertainty And Doubt During The Pandemic
Read Security Article

Adapting Security Strategies For A Remote Workforce

Ken Jenkins September 21, 2020
Adapting Security Strategies For A Remote Workforce
Read Security Article

A Moment Of Reflection: A CIO’s Perspective On The Remote Working Transition

Ian Pitt September 15, 2020
A Moment Of Reflection: A CIO’s Perspective On The Remote Working Transition
Read Security Article

Getting Cloud Right: The 4 Crucial Aspects Of Cloud Security

Robert Smith September 14, 2020
Getting Cloud Right: The 4 Crucial Aspects Of Cloud Security
Read Security Article

Tackling SIM Swap Fraud: Time For New, More Robust Verification Methods

Keiron Dalton September 14, 2020
Tackling SIM Swap Fraud: Time For New, More Robust Verification Methods
Read Security Article

Don’t Compromise Security For Business Continuity This Patch Tuesday

Chris Hodson September 8, 2020
Don’t Compromise Security For Business Continuity This Patch Tuesday
Read Security Article

2020 – Ransomware And ‘Data’ Security

Professor John Walker September 8, 2020
2020 – Ransomware And ‘Data’ Security
Read Security Article

Why The Reluctance In Adopting MFA?

François Amigorena September 7, 2020
Security a Necessity for Digital Enterprise Transformation
Read Security Article

Why Should You Use Access Management For Active Directory Users?

François Amigorena September 7, 2020
Why Should You Use Access Management For Active Directory Users?
Read Security Article

Phishing Trends In 2020: How To Adapt To Keep Hackers At Bay

Thomas Cartlidge September 4, 2020
Phishing Trends In 2020: How To Adapt To Keep Hackers At Bay
Read Security Article

Five Cyber Security Strategies Your Customers Should Know About

Steve Law September 3, 2020
Five Cyber Security Strategies Your Customers Should Know About
Read Security Article

9 Key Benefits Of Partnering With A Cybersecurity Provider

Robert Smith September 1, 2020
9 Key Benefits Of Partnering With A Cybersecurity Provider
Read Security Article

US Coast Guard Increases Maritime Cybersecurity Criteria For Commercial Vessels

Anastasios Arampatzis August 28, 2020
US Coast Guard Increases Maritime Cybersecurity Criteria For Commercial Vessels
Read Security Article

5 Industries At Risk For Cyberthreats During COVID-19

Devin Partida August 27, 2020
5 Industries At Risk For Cyberthreats During COVID-19
Read Security Article

The Changing World Of Encryption: TLS Deployments In 2020

David Warburton August 24, 2020
Security Encryption
Read Security Article

Security Awareness: Preventing Another Dark Web Horror Story

Barry McMahon August 24, 2020
Security Awareness: Preventing Another Dark Web Horror Story
Read Security Article
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 124
  • ›
Loading...

SECURELY DOTTED BY

Sam Curry, Chief Security Officer, Cybereason

"Operation-centric security enables security analysts to string together disparate pieces of information involved in malicious cyber activity. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Javvad Malik, Security Awareness Advocate, KnowBe4

"Given the trends of recent years, breaches have shown no signs of slowing down. "

Experts Reaction On World Economic Forum 2021 Report Cites Cyber Failure As 4th Highest Risk

Jake Moore, Cybersecurity Specialist, ESET

"Signal is open source which makes it easier to patch and keeps costs down. "

Major Security Flaws Found In Signal And other Video Chat Apps

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Security risks only get introduced when you turn it on and use it. "

Comment On IoT Risks Of Peloton Bike

Matt Lock, Technical Director , Varonis

"Everyone should take some basic precautions: check settings, change default passwords and disable features you’re not using. "

Comment On IoT Risks Of Peloton Bike

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Hackers use the login info gleaned from previous data breaches to perform credential stuffing or password spraying attacks. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"Ransomware will remain a global cyber security threat during 2021. "

70% of UK Finance Industry Hit With Cyber-Attacks In 2020

Boris Cipot, Senior Sales Engineer , Synopsys

"Cybercriminals will try to abuse every piece of information they have on you for their own personal gain. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Paul Bischoff, Privacy Advocate, Comparitech

"The fact that Chimera's activity went undiscovered for up to three months shows just how dangerous state-sponsored hackers can be. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Saryu Nayyar, CEO, Gurucul

"Two million Pixlr user accounts did not include financial information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Pravin Rasiah, VP of Product, CloudSphere

"Businesses should invest in a cloud governance platform that provides holistic, real-time observability into the cloud landscape. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Tim Callan, Chief Compliance Officer, Sectigo

"Certificate automation platforms can reduce the risk of breach of outage. "

NSA And Dutch NCSC Warn Outdated TLS Certs

Terry Greer-King, VP EMEA , SonicWall

"The only way to successfully mitigate against increasingly sophisticated attackers is to have a layered security posture. "

Federal Agency Warns Cloud Attacks Are On The Rise – How Can Businesses Stay Safe?

Jake Moore, Cybersecurity Specialist, ESET

"Passwords are in desperate need of an overhaul. "

Experts Reaction On New Chrome Update To Boost Password Security

Chris Morales, Head of Security Analytics, Vectra

"While the malware strains might slightly vary, and I’m sure more will be exposed. "

Expert Comment On New Malware Strain Found In SolarWinds Hack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel