facebook

Interview with Joe McNamee, EDRi

Written by: Gail Lobel Rand November 5, 2018
“Although GDPR is much better than previous legislation, particularly with regard to enforcement, there’s still some lack of clarity on issues like online tracking. Hopefully this will be dealt with over time. Obviously, it’s not ideal that companies are still stalking users as they surf the internet.” Joe McNamee, Executive Director, EDRi (European Digital Rights)...
facebook
I recently sat down with Taha Smily, an independent cybersecurity researcher to talk about the role he and other members of a new generation of ethical hackers play in keeping sites secure. Please tell me a little bit about yourself and how you got involved in cybersecurity research. My name is Taha Smily; I’m an...
facebook
Today’s companies spend a lot of money on technology and devices to keep their information safe from bad actors that intend reputational or financial harm. But no matter how good the technology in place may be, it is imperative that companies set policies assuring that none of their practices inadvertently open a door and release...
facebook
As the work environment becomes increasingly mobile, and more devices than ever before are connecting to company networks, security challenges are increasing exponentially.  Rohde & Schwarz Cybersecurity has developed technologies to keep networks secure by isolating sensitive data from the open internet while allowing employees to continue to use their applications without any additional steps...
facebook
Dealing with hundreds of unknown files and many false-positives, performing memory analysis, and protecting against fileless malware represent some of the biggest challenges organizations are facing today. Intezer Analyze™ provides rapid malware detection and analysis by breaking down the code of every unknown file and comparing its “genes” to all previously seen code, both legitimate...
facebook
With employees having access to more sensitive information than ever, companies need the ability to detect and prevent threats from inside, be they through negligence or malicious intent. However, differences between industries and company cultures require more than a one-size-fits-all approach. Teramind provides a totally customizable employee behavior monitoring solution to identify suspicious activity, spot...
facebook
Professional attackers wanting to exploit legitimate social media users are mass registering abusive user accounts in ways that they appear legitimate. Trying to detect these abusive accounts individually before they can do any damage is nearly impossible. DataVisor’s proprietary algorithm takes a new approach by analyzing multiple dimensions across multiple accounts and uncovering the hidden...
facebook
Outside the Firewall. It may sound like the next book in The Game of Thrones series, but it is very, very real and very today. It categorizes the ever-growing number of online threats which circumvent our firewalls. These threats can even exist on social media sites anywhere in the world, and we wouldn’t be any...
facebook
With cybercriminals becoming increasingly sophisticated in accessing all our connected devices and personal data, the traditional antivirus approach is simply unable to keep up with recognizing and stopping the constant emergence of new threats. We sat down with BullGuard’s CEO Paul Lipman to talk about their next generation engine and how it is continually learning...
facebook
With personal data fetching high prices on the dark web, the Internet of Things creating additional, potentially vulnerable access points to networks, and human fallibility, hackers have more reasons and opportunities than ever to steal digital information. Secure Channel uses real-time encryption to protect data, rendering it useless to unauthorized access. Please tell us a...