5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond […]
SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house […]
Blockchain is best known as the database technology facilitating and securing cryptocurrency transactions, but its application to broader cybersecurity issues is just beginning. The brilliance of blockchain technology lies in its ability to validate transactions between parties, and, in turn, store a permanent record of those transactions on a decentralized network. This functionality makes forging […]
Managed service providers (MSPs) have long relied on third-party software to manage clients’ IT infrastructure, but a massive ransomware attack launched over the weekend at customers of Kaseya will likely cause MSPs to take a harder look at the security of their IT suppliers. Kaseya revealed late Friday night that a zero-day vulnerability in its […]
The internet and, now, cloud computing transformed the way we conduct business. It’s insurmountable to succeed without the resources available online today. The downside to this long-term trend is that communications online, never mind on public cloud platforms, present vulnerabilities via web attacks and malware. Enter VPN technology. One longtime cybersecurity solution for small teams […]
No matter the breakthrough, no matter the latest fad or trend, the database remains a foundational component to IT ecosystems. Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Though the global Database Management System (DBMS) market knows […]
The RSA Conference’s Innovation Sandbox Contest has been a source of new ideas and approaches for an ever-evolving cybersecurity industry for 16 years. This year’s contest was no different, as startup founders and leaders made their pitches from around the world. From agentless solutions for multi-cloud infrastructures to implementing zero trust and threat scoring, the […]
In the biggest cyberattack to date on critical infrastructure in the U.S., Colonial Pipeline – sprawling 5,500 miles from Houston to New York City – halted its mainlines on Friday, May 7, when administrators detected advanced ransomware internally. On Thursday, a day before the ransomware attack, Russia-based cyber criminal group DarkSide stole more than 100GB […]
Antivirus protection isn’t enough to protect against today’s advanced threats. To fill this gap and aid in the analysis, detection, and testing of malware, sandboxing is widely used to give organizations the setting, isolation, and security tools needed to preserve the integrity of the host network. In 2021, sandboxes are now a fundamental part of […]
NFT-mania, pronounced nifty, is upon us with little time to prepare. From news of a collage selling for almost $70 million at Christie’s auction house to a portrayal of Janet Yellen and Morpheus rapping about cryptocurrency on SNL, the current craze is all about non-fungible tokens (NFTs). But what are NFTs, how do they work, […]
Subscribe to Cybersecurity Insider for top news, trends & analysis