Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!
Zero Trust strategies for navigating IoT/OT security challenges
Travais ‘Tee’ Sookoo leverages his 25 years of experience in network security, risk management, and architecture to help businesses of all sizes, from startups to multi-nationals, improve their security posture. He has a proven track record of leading and collaborating with security teams and designing secure solutions for diverse industries. Currently, Tee serves as a […]
Ransomware attack causes city street lights to “misbehave”
EXECUTIVE SUMMARY: In England, Leicester City is experiencing persistent problems with its street light system due to a recent cyber attack. While the street lights are ordinarily switched on and off at dawn and dusk, for the last six weeks, street lights across Leicester have remained illuminated during both the day and night. In some […]
The evolution from BEC to BCC
David Meister is a valued technology expert with over 15 years of experience in technical and consultancy roles across a range of technologies, including networking, telecommunications, infrastructure, and cyber security. After starting his career as a network engineer, David’s passion for using technology to solve problems led him through various roles, including engineer, technical manager, […]
Top 10 things CISOs should know about AI security tools
EXECUTIVE SUMMARY: As reported by executives, the top tangible benefit of AI is cyber security and risk management optimization. Right now, nearly 70% of enterprises say that they cannot effectively respond to cyber threats without AI security tools. However, despite the decidedly viable and valuable AI-based security opportunities that exist, sensationalism continues to obscure how […]
Secure out-of-band console and power management for Check Point security gateways
Contributed by WTI as part of Check Point’s CPX silver-level partner sponsorship opportunity. WTI is an industry leader in out-of-band network management. Nobody has time to drive to a site when an ISP drops service or you simply need to reconfigure and/or reboot a switch, router or firewall. Your time is too valuable not to […]
The MSSP perspective: CISO insights into stronger security
Gary Landau has been leading IT and information security teams for over 25 years as part of startups as well as large global organizations. He is currently a Virtual Field CISO with Unisys Security Services, where he supports companies in many different industries. His mantra is “keep making it better” and he is passionate about […]
10 must-know benefits of cyber security managed services (MSSPs)
EXECUTIVE SUMMARY: Three quarters of CEOs (74%) are concerned about their business’s ability to avert or limit damage from a cyber attack. Although most executives recognize the role of cyber security in maintaining organizational stability, some are instructing security admins to delay cyber security maintenance and upgrades due to resource constraints. In the long run, […]
Why enterprises are going hybrid and returning to colo!
By Ervin Suarez, Security Engineer for Cable and Colocation Accounts, Check Point Software Technologies. I’ve been closely observing a fascinating shift in the IT landscape and wanted to share some insights with all of you, especially given how these changes could impact our industry. Lately, there’s been a noticeable shift among enterprises back towards colocation […]
Is open source under siege?
EXECUTIVE SUMMARY: The recent discovery of a backdoor in XZ Utils, a core compression utility embedded in countless Linux systems, has sent shockwaves through the cyber security community. As journalist Kevin Roose of the New York Times pointed out in relation to the XZ Utils fiasco, in some places, the internet is held together by […]
How to protect company data in the gig economy
By Zac Amos, Features Editor, Rehack.com. Hiring gig workers and freelancers has a lot of business benefits, allowing companies to utilize the contractors’ expertise while saving money. Unfortunately, the rise of the gig workforce also opens up a new problem for businesses: increased cyber security vulnerabilities. If companies want to work with freelancers, they must understand the […]
Leveraging the power of AI and cloud computing
EXECUTIVE SUMMARY: As cyber adversaries diversify their tactics and devise increasingly sophisticated attack methods, legacy cyber security tools may not be competent enough to block threats. As every cyber security professional knows, novel and sophisticated threats are among the most difficult to prevent or defend against. That said, the convergence of artificial intelligence (AI) and […]
Key strategies for building cyber resilience in 2024
By Deryck Mitchelson, EMEA Field Chief Information Security Officer, Check Point Software Technologies. Cyber resilience is more than just a buzzword in the security industry; it is an essential approach to safeguarding digital assets in an era where cyber threats are not a matter of “if” but “when”. According to Check Point’s 2024 Cyber Security Report, […]