Sam Ingalls Avatar
  • Rainbow Table Attacks and Cryptanalytic Defenses

    Rainbow Table Attacks and Cryptanalytic Defenses

    Rainbow table attacks are an older but still effective tactic for threat actors targeting password database vulnerabilities. Today’s advanced persistent threats might elect for more sophisticated methods like remote desktop…

  • Doxing Attacks: From Hacker Tool to Societal Problem

    Doxing Attacks: From Hacker Tool to Societal Problem

    The malicious attack known as doxing has gone far beyond hacker tool, with the threat now extending to most digital platforms and making nearly anyone a target. Today, doxing continues…

  • Best Risk Management Software

    Best Risk Management Software

    Every organization needs visibility into the potential threats they face daily. Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution. While a…

  • What is Cybersecurity Risk Management?

    What is Cybersecurity Risk Management?

    Risk management is a concept that has been around as long as companies have had assets to protect. The simplest example may be insurance. Life, health, auto, and other insurance…

  • Top IoT Security Solutions

    Top IoT Security Solutions

    IoT security is where endpoint detection and response (EDR) and enterprise mobility management (EMM) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack surface grows,…

  • SBOMs: Securing the Software Supply Chain

    SBOMs: Securing the Software Supply Chain

    As threat actors aim at IT supply chains, enhanced cybersecurity has been the recent driving force for industry adoption of the Software Bill of Materials (SBOM) framework. With a simple…

  • Cynet 360 XDR Review: Features & Benefits

    Cynet 360 XDR Review: Features & Benefits

    If May’s endpoint detection and response (EDR) MITRE evaluations weren’t proof enough, Cynet’s flagship platform – also featuring XDR and MDR capabilities – continues to receive industry recognition. Cynet 360…

  • Preparing for Ransomware: Are Backups Enough?

    Preparing for Ransomware: Are Backups Enough?

    In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a…

  • Cybersecurity Risks of 5G – And How to Control Them

    Cybersecurity Risks of 5G – And How to Control Them

    5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come…

  • An Investment Firm Built Its Own SIEM. Here’s How.

    An Investment Firm Built Its Own SIEM. Here’s How.

    SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial…

Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis