Cyber Chief Magazine: Key strategies on your path towards data security Download Now
12 May, 2016 | Alex Vovk

How to Escape Data Tampering Nightmare

Earlier this year Admiral Michael Rogers, head of the NSA and the US Cyber Command, talked about the key 'three things that keep him awake at night' The first two are the fear of online attacks against US critical infrastructure and non-state terrorist groups changing how they use online...
11 March, 2016 | Michael Fimin

Top Five Hottest Trends at RSA 2016 Conference

The 25th 2016 RSA Conference, held in San Francisco, CA, has brought together the record number of attendees from all over the world to discuss major IT industry trends and upcoming challenges. For the past years, RSA Conference has been raising different hot topics, from unstructured data...
8 February, 2016 | Michael Fimin

5 Keynotes from the ENISA Guide on Vulnerability Disclosure

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced. According to a “Good Practice Guide on Vulnerability Disclosure” by European Union Agency for Network and Information Security (ENISA), published in December 2015, the volume of...
16 October, 2014 | John O'Neill Sr.

Shellshock Demands a Managed Response

Shellshock is the latest and possibly most significant IT security vulnerability identified by researchers. I imagine that by now most IT pros have heard of this threat. In a year of unprecedented security events, some may be “tuning out” security. If ever there was an IT vulnerability to not...
19 September, 2014 | Richard Muniz

Patching Is Mitigation You Do on Daily Basis

Recently, Disaster Recovery was a topic of several blog posts.  So far we’ve identified the four pieces, and they are: • Mitigation: lessening or eliminating the impact of an event • Planning: putting together a document that will act as a script to help you get back up and...