Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Category:

Security Articles

The Role Of Geospatial Data In Cybersecurity

Devin Partida September 24, 2020
The Role Of Geospatial Data In Cybersecurity
Read Security Article

Digital Inclusion: What Does It Bring To The Future Of Connected Vehicles?

Alexander Moiseev September 23, 2020
Hacking vulnerability
Read Security Article

Tackling Open Source Security For Faster Innovation

Robert Former September 21, 2020
Tackling Open Source Security For Faster Innovation
Read Security Article

Fraudsters Capitalise On Fear, Uncertainty And Doubt During The Pandemic

David Emm September 21, 2020
Fraudsters Capitalise On Fear, Uncertainty And Doubt During The Pandemic
Read Security Article

Adapting Security Strategies For A Remote Workforce

Ken Jenkins September 21, 2020
Adapting Security Strategies For A Remote Workforce
Read Security Article

A Moment Of Reflection: A CIO’s Perspective On The Remote Working Transition

Ian Pitt September 15, 2020
A Moment Of Reflection: A CIO’s Perspective On The Remote Working Transition
Read Security Article

Getting Cloud Right: The 4 Crucial Aspects Of Cloud Security

Robert Smith September 14, 2020
Getting Cloud Right: The 4 Crucial Aspects Of Cloud Security
Read Security Article

Tackling SIM Swap Fraud: Time For New, More Robust Verification Methods

Keiron Dalton September 14, 2020
Tackling SIM Swap Fraud: Time For New, More Robust Verification Methods
Read Security Article

Don’t Compromise Security For Business Continuity This Patch Tuesday

Chris Hodson September 8, 2020
Don’t Compromise Security For Business Continuity This Patch Tuesday
Read Security Article

2020 – Ransomware And ‘Data’ Security

Professor John Walker September 8, 2020
2020 – Ransomware And ‘Data’ Security
Read Security Article

Why The Reluctance In Adopting MFA?

François Amigorena September 7, 2020
Security a Necessity for Digital Enterprise Transformation
Read Security Article

Why Should You Use Access Management For Active Directory Users?

François Amigorena September 7, 2020
Why Should You Use Access Management For Active Directory Users?
Read Security Article

Phishing Trends In 2020: How To Adapt To Keep Hackers At Bay

Thomas Cartlidge September 4, 2020
Phishing Trends In 2020: How To Adapt To Keep Hackers At Bay
Read Security Article

Five Cyber Security Strategies Your Customers Should Know About

Steve Law September 3, 2020
Five Cyber Security Strategies Your Customers Should Know About
Read Security Article

9 Key Benefits Of Partnering With A Cybersecurity Provider

Robert Smith September 1, 2020
9 Key Benefits Of Partnering With A Cybersecurity Provider
Read Security Article

US Coast Guard Increases Maritime Cybersecurity Criteria For Commercial Vessels

Anastasios Arampatzis August 28, 2020
US Coast Guard Increases Maritime Cybersecurity Criteria For Commercial Vessels
Read Security Article

5 Industries At Risk For Cyberthreats During COVID-19

Devin Partida August 27, 2020
5 Industries At Risk For Cyberthreats During COVID-19
Read Security Article

The Changing World Of Encryption: TLS Deployments In 2020

David Warburton August 24, 2020
Security Encryption
Read Security Article

Security Awareness: Preventing Another Dark Web Horror Story

Barry McMahon August 24, 2020
Security Awareness: Preventing Another Dark Web Horror Story
Read Security Article

Top 3 Emerging Technologies That Define ‘Future’ Cybersecurity!

Robert Smith August 19, 2020
Top 3 Emerging Technologies That Define 'Future' Cybersecurity!
Read Security Article

Five Factors That Form How Security Awareness Training Programs Are Developing

Elena Molchanova August 17, 2020
Five Factors That Form How Security Awareness Training Programs Are Developing
Read Security Article

Monitoring From Home: 3 Things To Still Watch Out For In Your IT Network

Martin Hodgson August 12, 2020
Monitoring From Home: 3 Things To Still Watch Out For In Your IT Network
Read Security Article

China Crisis (Part 2) – Understanding And Kindness

Professor John Walker August 3, 2020
unprecedented sanctions specific to Chinese companies
Read Security Article

Driving Secure 5G Operations With A Triangle Of Trust

Gerald Reddig July 30, 2020
Driving Secure 5G Operations With A Triangle Of Trust
Read Security Article

5 Key Factors To ‘Avoid’ Information Security Risks

Robert Smith July 29, 2020
5 Key Factors To ‘Avoid’ Information Security Risks
Read Security Article

The Case For The Galaxkey Trusted Digital Document Signing

Professor John Walker July 27, 2020
The Case For The Galaxkey Trusted Digital Document Signing
Read Security Article
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 124
  • ›
Loading...

SECURELY DOTTED BY

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel