Sam Ingalls Avatar
  • A photo of a satellite in space with the backdrop of Earth. Satellites will be a key component of 5G adoption worldwide that will expand connectivity but also poses new cybersecurity risks. Read more to learn what they are and how to prepare.

    Cybersecurity Risks of 5G – And How to Control Them

    5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond […]

  • A picture of a construction site in the distance representing the work done by Two Sigma Investments to build their own SIEM.

    An Investment Firm Built Its Own SIEM. Here’s How.

    SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house […]

  • blockchain security

    The State of Blockchain Applications in Cybersecurity

    Blockchain is best known as the database technology facilitating and securing cryptocurrency transactions, but its application to broader cybersecurity issues is just beginning. The brilliance of blockchain technology lies in its ability to validate transactions between parties, and, in turn, store a permanent record of those transactions on a decentralized network. This functionality makes forging […]

  • A picture of a line of matches showing a progression of chaos from one to the next; similarly a supply chain attack can have serious consequences for any organization that relies on a third-party provider for IT management services.

    Kaseya Breach Underscores Vulnerability of IT Management Tools

    Managed service providers (MSPs) have long relied on third-party software to manage clients’ IT infrastructure, but a massive ransomware attack launched over the weekend at customers of Kaseya will likely cause MSPs to take a harder look at the security of their IT suppliers. Kaseya revealed late Friday night that a zero-day vulnerability in its […]

  • A picture taken from inside a tunnel where you can see the other end and a person sticking out. Much like a tunnel, VPNs offer a way to securely communicate in risky environments like the internet.

    15 Best Enterprise VPN Solutions

    The internet and, now, cloud computing transformed the way we conduct business. It’s insurmountable to succeed without the resources available online today. The downside to this long-term trend is that communications online, never mind on public cloud platforms, present vulnerabilities via web attacks and malware. Enter VPN technology. One longtime cybersecurity solution for small teams […]

  • A picture of a woman standing in front of a projector that is shining plenty of alphanumeric strings across her face and the wall behind her. Like database security, any data administrator knows the amount of sheer information involved in managing database servers.

    Top 20 Database Security Solutions

    No matter the breakthrough, no matter the latest fad or trend, the database remains a foundational component to IT ecosystems. Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Though the global Database Management System (DBMS) market knows […]

  • Picture of an audience looking on to represent the annual RSA conference for cybersecurity industry professionals and the Innovation Sandbox Contest.

    And the Winner of the 2021 RSAC Innovation Contest is…

    The RSA Conference’s Innovation Sandbox Contest has been a source of new ideas and approaches for an ever-evolving cybersecurity industry for 16 years. This year’s contest was no different, as startup founders and leaders made their pitches from around the world. From agentless solutions for multi-cloud infrastructures to implementing zero trust and threat scoring, the […]

  • An image of an oil well stranded by human resources an incapable of operating.

    Colonial Pipeline Ransomware Attack Shows Critical Infrastructure Vulnerabilities

    In the biggest cyberattack to date on critical infrastructure in the U.S., Colonial Pipeline – sprawling 5,500 miles from Houston to New York City – halted its mainlines on Friday, May 7, when administrators detected advanced ransomware internally. On Thursday, a day before the ransomware attack, Russia-based cyber criminal group DarkSide stole more than 100GB […]

  • Malware can't survive in this desert

    Sandboxing: Advanced Malware Analysis

    Antivirus protection isn’t enough to protect against today’s advanced threats. To fill this gap and aid in the analysis, detection, and testing of malware, sandboxing is widely used to give organizations the setting, isolation, and security tools needed to preserve the integrity of the host network. In 2021, sandboxes are now a fundamental part of […]

  • User placing digital card near laptop

    NFTs: The Newest Collectible

    NFT-mania, pronounced nifty, is upon us with little time to prepare. From news of a collage selling for almost $70 million at Christie’s auction house to a portrayal of Janet Yellen and Morpheus rapping about cryptocurrency on SNL, the current craze is all about non-fungible tokens (NFTs). But what are NFTs, how do they work, […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis