GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach to VM Unlike a typical cyber attack that exploits ...
GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors

GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors

Imagine being a young person who wants a career, of whatever type you can find, as a cybersecurity professional. Related: Up-skilling workers to boost security Related Although you were born with an ...
GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote ...
AV-Comparatives Anti-Phishing Test | Avast

AV-Comparatives Anti-Phishing Test | Avast

| | Avast News
If an antivirus is doing its job, you never really have to think about it. It should be running in the background, protecting your devices from all types of attacks. But if ...
New Instagram scam uses fake SHEIN gift cards as lure

New Instagram scam uses fake SHEIN gift cards as lure

| | Security News
Avast researchers have detected a new scam targeting Instagram users from various countries including the UK, Australia, France, Spain, and Poland.  ...
Banks now subject to API security audits by Byron Acohido

FIRESIDE CHAT: U.S. banking regulators call out APIs as embodying an attack surface full of risk

APIs have been a linchpin as far as accelerating digital transformation — but they’ve also exponentially expanded the attack surface of modern business networks. Related: Why ‘attack surface management’ has become crucial ...
GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity professionals are good ideas, they might not pay off ...
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping In fact, a majority of scams occur through social ...