Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Category:

Security Articles

How 3 Words Can Save A Life

Professor John Walker July 24, 2020
How 3 Words Can Save A Life
Read Security Article

Improving The Cybersecurity Of A Remote Workforce

Barry McMahon July 23, 2020
Improving The Cybersecurity Of A Remote Workforce
Read Security Article

How To Recover From Ransomware

Gijsbert Janssen van Doorn July 23, 2020
How To Recover From Ransomware
Read Security Article

Blinking In The Dark: A Day In The Life Of A CISO

Peter Romano July 23, 2020
Blinking In The Dark: A Day In The Life Of A CISO
Read Security Article

Deploying Apps At Speed? Try Self-Service Security

Josh Kirkwood July 21, 2020
Deploying Apps At Speed? Try Self-Service Security
Read Security Article

Cyber Against Granny

Yotam Gutman July 20, 2020
Cyber Against Granny
Read Security Article

Address Decision Fatigue – Before It Turns Code Into Spaghetti

Derek Lee Boire July 20, 2020
Address Decision Fatigue - Before It Turns Code Into Spaghetti
Read Security Article

China Crisis – The Yellow Brick Road Of Deceit

Professor John Walker July 16, 2020
unprecedented sanctions specific to Chinese companies
Read Security Article

The Rise Of Remote Work: How To Use Technology To Engage, Connect And Protect Your Employees

Stefan Spendrup July 13, 2020
The Rise Of Remote Work: How To Use Technology To Engage, Connect And Protect Your Employees
Read Security Article

Adding A New Layer Of Security To The Global Internet

Adam Davenport July 7, 2020
Adding A New Layer Of Security To The Global Internet
Read Security Article

The Fundamentals Of COVID-19 Risk Assessment

Professor John Walker July 6, 2020
The Fundamentals Of COVID-19 Risk Assessment
Read Security Article

Cybersecurity 101 For SMBs And SOHOs

Thorsten Kurpjuhn July 1, 2020
Cybersecurity 101 For SMBs And SOHOs
Read Security Article

How Mobile Tech Can Ease The COVID-19 Burden On Retail And Logistics

Stefan Spendrup June 30, 2020
How Mobile Tech Can Ease The COVID-19 Burden On Retail And Logistics
Read Security Article

AI Adoption – Data Governance Must Take Precedence

Rachel Roumeliotis June 29, 2020
AI Adoption – Data Governance Must Take Precedence
Read Security Article

Cybersecurity 101 For SMBs And SOHOs

Thorsten Kurpjuhn June 25, 2020
Cybersecurity 101 For SMBs And SOHOs
Read Security Article

Security From Home: Protecting A Self-isolated Workforce

Fiona Boyd June 23, 2020
Security From Home: Protecting A Self-isolated Workforce
Read Security Article

Keeping Your Cloud-based Office Safe And Secure

Nick Turner June 18, 2020
Keeping Your Cloud-based Office Safe And Secure
Read Security Article

How To Counter Phishing Vulnerabilities When Returning To Work

Richard Hahn June 17, 2020
How To Counter Phishing Vulnerabilities When Returning To Work
Read Security Article

Is Your Remote Working Model Compliant?

Mike Puglia June 17, 2020
Is Your Remote Working Model Compliant?
Read Security Article

How Credential Stuffing Is Evolving

Jarrod Overson June 17, 2020
Legit Login Credentials
Read Security Article

Breaking Down AI’s Role In Cybersecurity

Paul Vidic June 17, 2020
Cybersecurity
Read Security Article

Astronomer To Cyber Wizardry

Professor John Walker June 16, 2020
Astronomer To Cyber Wizardry
Read Security Article

Redacting PDFs – A Simple Task With Lots Of Consequences

Dave Giordano June 15, 2020
Redacting PDFs – A Simple Task With Lots Of Consequences
Read Security Article

The Evolving Global Privacy Framework

André Thompson June 12, 2020
The Evolving Global Privacy Framework
Read Security Article

The “Mobius Strip” Of Cyber Security

Miles Tappin June 12, 2020
The “Mobius Strip” Of Cyber Security
Read Security Article

Cybersecurity: Keeping Organisations Secure In The Post-pandemic Reality

Dr. Muhammad Malik June 9, 2020
Multiple Attack
Read Security Article
  • ‹
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 124
  • ›
Loading...

SECURELY DOTTED BY

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel