
David Balaban
Cybersecurity Expert, Journalist, Editor at Freelance
David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.
Articles
-
1 week ago |
benzinga.com | David Balaban
If you've been in the cybersecurity space long enough, you'll know that having great tech isn't enough on its own. You as a vendor need decision makers to actually know about it, which translates into leveraging an effective strategy to distribute your security announcement so that it’s heard by the intended audience. But there's a brutal yet simple reality that security vendors need to keep in mind. Most security announcements fail to reach the people who control budgets.
-
2 weeks ago |
cloudsecurityalliance.org | David Balaban
Written by David Balaban. At this point, it’s hardly news that the vast majority of cybersecurity breaches start with social engineering campaigns, most commonly phishing attacks. It’s not just breaches, either: according to some estimates, a whopping 45% of ransomware attacks begin with phishing campaigns, for example. Disrupting such cyberattacks early, at the social engineering stage, is an effective way to protect your organization from the oft-costly and damaging consequences of a breach.
-
1 month ago |
secureworld.io | David Balaban
Translating Deep Cybersecurity Knowledge into Media Opportunities6:57 You've built your cybersecurity business on years of solid technical expertise. Your team has a deep understanding of all the modern threats, solutions, and security architecture that most people wouldn't be able to understand (or even know exists).
-
1 month ago |
secureworld.io | David Balaban
How Security Teams Collect the Data They Need for Threat Intelligence6:38 The evolution of cybercrime is shifting into hyperdrive. Malicious actors are file-tuning their tactics, techniques, and procedures (TTP) non-stop, leveraging AI to make attacks more sophisticated, and automation to overwhelm the target's defenses.
-
2 months ago |
cloudsecurityalliance.org | David Balaban
Written by David Balaban. Staff records often contain sensitive content like personal identifiers and company-related communications. If this data is not properly cleared, it can result in compliance issues and unauthorized access. A systematic method guarantees that all digital and physical details are either erased, archived, or transferred in accordance with industry regulations. Furthermore, taking the route of automation throughout this process minimizes the risk of human error and misuse.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 11
- Tweets
- 44
- DMs Open
- No