Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Zero Trust strategies for navigating IoT/OT security challenges

    Travais Sookoo

    Travais ‘Tee’ Sookoo leverages his 25 years of experience in network security, risk management, and architecture to help businesses of all sizes, from startups to multi-nationals, improve their security posture. He has a proven track record of leading and collaborating with security teams and designing secure solutions for diverse industries. Currently, Tee serves as a […]

    Source: CyberTalk | Published: Apr 26, 2024
  • Ransomware attack causes city street lights to “misbehave”

    Network hacked concept art

    EXECUTIVE SUMMARY: In England, Leicester City is experiencing persistent problems with its street light system due to a recent cyber attack. While the street lights are ordinarily switched on and off at dawn and dusk, for the last six weeks, street lights across Leicester have remained illuminated during both the day and night. In some […]

    Source: CyberTalk | Published: Apr 25, 2024
  • The evolution from BEC to BCC

    David Meister, Global Head of Channel and MSP -Email Security

    David Meister is a valued technology expert with over 15 years of experience in technical and consultancy roles across a range of technologies, including networking, telecommunications, infrastructure, and cyber security. After starting his career as a network engineer, David’s passion for using technology to solve problems led him through various roles, including engineer, technical manager, […]

    Source: CyberTalk | Published: Apr 24, 2024
  • Top 10 things CISOs should know about AI security tools

    AI security tools concept art including young CISO working remotely

    EXECUTIVE SUMMARY: As reported by executives, the top tangible benefit of AI is cyber security and risk management optimization. Right now, nearly 70% of enterprises say that they cannot effectively respond to cyber threats without AI security tools. However, despite the decidedly viable and valuable AI-based security opportunities that exist, sensationalism continues to obscure how […]

    Source: CyberTalk | Published: Apr 23, 2024
  • Secure out-of-band console and power management for Check Point security gateways

    Contributed by WTI as part of Check Point’s CPX silver-level partner sponsorship opportunity. WTI is an industry leader in out-of-band network management. Nobody has time to drive to a site when an ISP drops service or you simply need to reconfigure and/or reboot a switch, router or firewall. Your time is too valuable not to […]

    Source: CyberTalk | Published: Apr 22, 2024
  • The MSSP perspective: CISO insights into stronger security

    Gary Landau, Virtual CISO, Unisys Security Services

    Gary Landau has been leading IT and information security teams for over 25 years as part of startups as well as large global organizations. He is currently a Virtual Field CISO with Unisys Security Services, where he supports companies in many different industries. His mantra is “keep making it better” and he is passionate about […]

    Source: CyberTalk | Published: Apr 19, 2024
  • 10 must-know benefits of cyber security managed services (MSSPs)

    MSSP provider concept art

    EXECUTIVE SUMMARY: Three quarters of CEOs (74%) are concerned about their business’s ability to avert or limit damage from a cyber attack. Although most executives recognize the role of cyber security in maintaining organizational stability, some are instructing security admins to delay cyber security maintenance and upgrades due to resource constraints. In the long run, […]

    Source: CyberTalk | Published: Apr 17, 2024
  • Why enterprises are going hybrid and returning to colo!

    Ervin Suarez, Security Engineer Cable and Colocation Accounts, Americas, Check Point

    By Ervin Suarez, Security Engineer for Cable and Colocation Accounts, Check Point Software Technologies. I’ve been closely observing a fascinating shift in the IT landscape and wanted to share some insights with all of you, especially given how these changes could impact our industry. Lately, there’s been a noticeable shift among enterprises back towards colocation […]

    Source: CyberTalk | Published: Apr 16, 2024
  • Is open source under siege?

    Cyber security concept art

    EXECUTIVE SUMMARY: The recent discovery of a backdoor in XZ Utils, a core compression utility embedded in countless Linux systems, has sent shockwaves through the cyber security community. As journalist Kevin Roose of the New York Times pointed out in relation to the XZ Utils fiasco, in some places, the internet is held together by […]

    Source: CyberTalk | Published: Apr 15, 2024
  • How to protect company data in the gig economy

    Gig worker at laptop

    By Zac Amos, Features Editor, Rehack.com. Hiring gig workers and freelancers has a lot of business benefits, allowing companies to utilize the contractors’ expertise while saving money. Unfortunately, the rise of the gig workforce also opens up a new problem for businesses: increased cyber security vulnerabilities. If companies want to work with freelancers, they must understand the […]

    Source: CyberTalk | Published: Apr 12, 2024
  • Leveraging the power of AI and cloud computing

    AI and cloud computing

    EXECUTIVE SUMMARY: As cyber adversaries diversify their tactics and devise increasingly sophisticated attack methods, legacy cyber security tools may not be competent enough to block threats. As every cyber security professional knows, novel and sophisticated threats are among the most difficult to prevent or defend against. That said, the convergence of artificial intelligence (AI) and […]

    Source: CyberTalk | Published: Apr 11, 2024
  • Key strategies for building cyber resilience in 2024

    Deryck Mitchelson, Field CISO EMEA, Check Point

    By Deryck Mitchelson, EMEA Field Chief Information Security Officer, Check Point Software Technologies. Cyber resilience is more than just a buzzword in the security industry; it is an essential approach to safeguarding digital assets in an era where cyber threats are not a matter of “if” but “when”. According to Check Point’s 2024 Cyber Security Report, […]

    Source: CyberTalk | Published: Apr 10, 2024