RESOURCES


home.aspx
   
Are university networks wide open to cyber-attacks? ARE UNIVERSITY NETWORKS WIDE OPEN TO CYBER-ATTACKS?

blog article

Jan 23, 2020

The explosion of the Internet of Things (IoT) – that is, anything from laptops to printers to security cameras and heating sensors that connect to the internet – has meant that organisations and institutions today struggle to get a comprehensive view of all the IT endpoints that connect ...

Read More

PoC Exploits Do More Good Than Harm: Threatpost Poll POC EXPLOITS DO MORE GOOD THAN HARM: THREATPOST POLL

blog article

Jan 22, 2020

When it comes to the release of proof-of-concept (PoC) exploits, more security experts agree that the positives outweigh the negatives, according to a recent and informal Threatpost poll. Last week, Threatpost conducted a reader poll and almost 60 percent of 230 security pundits thought it was a &ld...

Read More

ETHICAL HACKERS: WHY YOUR ORGANIZATION NEEDS THEM ETHICAL HACKERS: WHY YOUR ORGANIZATION NEEDS THEM

blog article

Jan 20, 2020

Over the past few decades, law enforcement agencies are hiring undercover agents to solve their toughest cases. A similar concept is now applicable in the information security world. They confide in ethical hackers. The idea of hiring an ethical hacker is contradictory to many who rarely understand ...

Read More

Cyber-security salaries soar as firms scrabble to lock up data CYBER-SECURITY SALARIES SOAR AS FIRMS SCRABBLE TO LOCK UP DATA

blog article

Jan 20, 2020

Reed’s report showed rises across the board for all IT-related roles, with technology the fastest-growing sector last year after a 13.8 per cent hike in jobs posted and a 4.7 per cent increase in the average salary. With the number of data breaches increasing and massive fines levied against f...

Read More

Bechtle future-proofs 70+ business locations by focusing on user experience and adoption BECHTLE FUTURE-PROOFS 70+ BUSINESS LOCATIONS BY FOCUSING ON USER EXPERIENCE AND ADOPTION

whitepaper

Jan 20, 2020

As Germany’s largest IT provider, Bechtle future-proofs technology for clients across Europe – placing special focus on improving employee experiences. Marco Stalder, team leader of Workspace services at Bechtle, knew the successful roll out of future-ready apps and technology demanded both an easy-...

Read More

You have the power to redefine the work experience. Get to know Citrix Workspace. YOU HAVE THE POWER TO REDEFINE THE WORK EXPERIENCE. GET TO KNOW CITRIX WORKSPACE.

whitepaper

Jan 20, 2020

The next big move toward better employee engagement and more empowerment will come from the IT department. Research says that there is a way to improve the employee experience. If we remove the clutter, reduce the complexity of the technology employees use, and eliminate distractions we deliver a be...

Read More

Three reasons to manage Office 365 with Citrix Workspace THREE REASONS TO MANAGE OFFICE 365 WITH CITRIX WORKSPACE

whitepaper

Jan 20, 2020

Are you considering migrating to Microsoft Office 365 or already facing challenges with the move? Don’t worry - you’re not alone. Find out how you can maximize your move to Microsoft in the cloud with Citrix through the power of our unique solution that is influenced by our more than 20-year partner...

Read More

Produktivität der Mitarbeiter durch IT-Vereinfachung steigern PRODUKTIVITÄT DER MITARBEITER DURCH IT-VEREINFACHUNG STEIGERN

whitepaper

Jan 20, 2020

Erfahren Sie, wie ein digitaler Arbeitsplatz Ihnen bei Folgendem hilft: Mitarbeitern wichtige Anwendungen und Daten bereitstellen Performance mit einheitlichen Analysen steigern Zugriff auf Apps in hybriden Umgebungen konsolidieren Lesen Sie dieses E-Book und erfahren Sie, wie ein digitaler Arbeitsp...

Read More

Drei Gründe für die Verwaltung von Office 365 über Citrix Workspace DREI GRÜNDE FÜR DIE VERWALTUNG VON OFFICE 365 ÜBER CITRIX WORKSPACE

whitepaper

Jan 20, 2020

Ziehen Sie eine Migration zu Microsoft Office 365 in Erwägung oder haben Sie bereits Probleme beim Wechsel? Machen Sie sich keine Sorgen – Sie sind nicht allein. Finden Sie heraus, wie Sie den Wechsel zu Microsoft in der Cloud mit Citrix mit Hilfe einer einzigartigen Lösung optimieren können, die du...

Read More

Cyber Security Guidelines and Norms for Buildings CYBER SECURITY GUIDELINES AND NORMS FOR BUILDINGS

video

Jan 17, 2020

Continuesly monitoring changes in the building is crutial to ensure cyber security. How the norms and guidelines help us prevent cyber threads and risks, is explained by our expert Frederik De Meyer.

Read More

How to Prevent Your Business Being Hacked HOW TO PREVENT YOUR BUSINESS BEING HACKED

blog article

Jan 16, 2020

During the past two months, I have been approached by four different businesses to help and support them through security breaches that have occurred. In each case, there have been common themes. My concern and frustration arise from the fact that each breach could have easily been prevented by doin...

Read More

Renforcez l RENFORCEZ L'ENGAGEMENT DE VOS COLLABORATEURS AVEC UNE INFORMATIQUE SIMPLIFIÉE

whitepaper

Jan 16, 2020

Découvrez comment un Digital Workspace vous aide à : Livrer les applications et les données dont les individus ont besoin pour être productifs Améliorer les performances grâce à une analytique unifiée Unifier l’accès aux applications dans des environnements hybrides Téléchargez cet eBook qui expliqu...

Read More

Trois bonnes raisons d’administrer Office 365 avec Citrix Workspace TROIS BONNES RAISONS D’ADMINISTRER OFFICE 365 AVEC CITRIX WORKSPACE

whitepaper

Jan 16, 2020

Vous envisagez de migrer vers Microsoft Office 365 ou vous rencontrez des difficultés avec cette migration ? Ne vous inquiétez pas, vous n’êtes pas le seul. Découvrez comment optimiser votre passage à Microsoft dans le cloud avec Citrix via la puissance d’une solution unique bénéficiant de plus de 2...

Read More

Best Practices für die optimale Nutzung von Microsoft Office 365 BEST PRACTICES FÜR DIE OPTIMALE NUTZUNG VON MICROSOFT OFFICE 365

whitepaper

Jan 16, 2020

In diesem Whitepaper erfahren Sie, wie Ihre Mitarbeiter mit Hilfe von Citrix Workspace noch produktiver werden und Sie gleichzeitig die Verwaltbarkeit und Sicherheit verbessern. Sie erfahren auch, wie Sie: Die Migration in jeder beliebigen Cloud-Umgebung vereinfachen Risiken mindern, egal wo und wie...

Read More

The definitive guide to Citrix Workspace THE DEFINITIVE GUIDE TO CITRIX WORKSPACE

whitepaper

Jan 16, 2020

There's a lot to consider when choosing a digital workspace, but this guide will provide a framework to help simplify your decision-making process. With concise yet detailed information on Citrix Workspace, you'll rest assured you're choosing a solution that meets business and IT needs. Download "Th...

Read More

A great employee experience matters more than you think A GREAT EMPLOYEE EXPERIENCE MATTERS MORE THAN YOU THINK

whitepaper

Jan 16, 2020

In a new 451 Research Pathfinder Report, “The Employee Experience: WHAT IT LOOKS LIKE AND WHY IT’S CRITICAL FOR YOUR BUSINESSES SUCCESS,” Chris Marsh of 451 Research notes, “The idea that people matter – and happy people matter tremendously – to the success of a business is slowly becoming more comm...

Read More

UEM: The modern way to secure and manage your devices Manage endpoints from a single console UEM: THE MODERN WAY TO SECURE AND MANAGE YOUR DEVICES MANAGE ENDPOINTS FROM A SINGLE CONSOLE

whitepaper

Jan 16, 2020

Citrix Workspace delivers seamless, secure user access to apps and files on any device all while giving IT the power to manage desktops, laptops, smartphones, tablets across iOS, Android, Windows, Chrome OS, and MacOS platforms. Read this white paper to find out more about how Citrix delivers a UEM ...

Read More

The Business Benefits of Enabling the Modern Workspace THE BUSINESS BENEFITS OF ENABLING THE MODERN WORKSPACE

whitepaper

Jan 16, 2020

In this report, J. Gold Associates explores how a modern workspace helps minimize security issues, decreases the time spent on help desk tickets, boosts employee engagement, and drives a strong return on investment (ROI). Download the J. Gold Associates research report to find out how a modern works...

Read More

Die geschäftlichen Vorteile eines modernen Arbeitsplatzes DIE GESCHÄFTLICHEN VORTEILE EINES MODERNEN ARBEITSPLATZES

whitepaper

Jan 16, 2020

In diesem Bericht erörtert J. Gold Associates, wie ein moderner Arbeitsplatz Sicherheitsprobleme und den Zeitaufwand von Helpdesks minimiert, die Mitarbeiterzufriedenheit steigert und eine starke Investitionsrendite realisiert. Laden Sie den Forschungsbericht von J. Gold Associates herunter und erfa...

Read More

Increasing Cybersecurity Skills and Awareness INCREASING CYBERSECURITY SKILLS AND AWARENESS

video

Jan 14, 2020

Keep your cybersecurity skills relevant in 2020. Learn more about the cybersecurity skills gap and how you can take small steps to increase your cybersecurity awareness.

Read More

Understanding Canadian cybersecurity laws: the foundations UNDERSTANDING CANADIAN CYBERSECURITY LAWS: THE FOUNDATIONS

blog article

Jan 13, 2020

The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure. Cyberspace is playing an undeniably fundamental role in our day-to-day lives and in business operations around ...

Read More

Cybersecurity Threats Call for a Global Response CYBERSECURITY THREATS CALL FOR A GLOBAL RESPONSE

blog article

Jan 13, 2020

Last March, Operation Taiex led to the arrest of the gang leader behind the Carbanak and Cobalt malware attacks on over 100 financial institutions worldwide. This law enforcement operation included the Spanish national police, Europol, FBI, the Romanian, Moldovan, Belarusian, and Taiwanese authoriti...

Read More

EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL? EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL?

blog article

Jan 11, 2020

The growth of cybercrime puts businesses and government agencies at the risk of constant threats to their crucial business data, customer data, financial information, and other trade secrets. Cybersecurity professionals play an important role in protecting businesses from cybercriminals. The demand ...

Read More

BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING

blog article

Jan 10, 2020

The bug bounty initiative is gaining popularity thanks to the shift in security strategies. It has proven to be a great savior from severe vulnerabilities. If cybercriminals find their way to the bug first, they may exploit it for financial gains. Cybersecurity and Infrastructure Agency (CISA) notic...

Read More

Shaun Stalker: Cybersecurity in a Dynamic Ever-Changing World SHAUN STALKER: CYBERSECURITY IN A DYNAMIC EVER-CHANGING WORLD

video

Jan 10, 2020

Insecurity host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s...

Read More

BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS

blog article

Jan 09, 2020

Every year, millions of dollars of cryptocurrency are stolen from crypto wallets. After thousands of botnet attacks, cybercriminals are now looking for new ways to make money. To this end, the introduction of cryptocurrency mining botnets came about. It is now sold as a service. Recently, French pol...

Read More

Homeland Security Warns About Cyber Security Threat HOMELAND SECURITY WARNS ABOUT CYBER SECURITY THREAT

video

Jan 08, 2020

American businesses and organizations are on alert for retaliation from Iran in the form of a disruptive cyber attack. WBZ-TV's Juli McDonald reports.

Read More

Top Cybersecurity Threats in 2020 TOP CYBERSECURITY THREATS IN 2020

blog article

Jan 08, 2020

A host of new and evolving cybersecurity threats has the information security industry on high alert. Ever-more sophisticated cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrency and more have placed the data and assets of corporations, governments a...

Read More

Regulatory Scrutiny Of Buy Side Will Not Abate REGULATORY SCRUTINY OF BUY SIDE WILL NOT ABATE

blog article

Jan 08, 2020

Deloitte highlighted that asset managers this year will face more regulatory scrutiny of their holdings of higher risk assets, implementation of technological change and should continue to modernize their regulatory, legal, and compliance functions. The consultancy’s 2020 Investment Management...

Read More

Centre for Cyber Security and Privacy Launch Event CENTRE FOR CYBER SECURITY AND PRIVACY LAUNCH EVENT

video

Jan 07, 2020

The Birmingham Centre for Cyber Security and Privacy produces impactful world-leading research in cyber security and privacy. The Centre prides itself in its collaborative and interdisciplinary approach, working alongside academia, industry and government to tackle cyber security challenges in our s...

Read More

Adaptation Is Key to Determining Network Resilience in Cyberattacks, Study Finds ADAPTATION IS KEY TO DETERMINING NETWORK RESILIENCE IN CYBERATTACKS, STUDY FINDS

blog article

Jan 06, 2020

A new study shows that traditional markers of a computer network's resilience are not solely effective in determining its ability to accomplish missions. Researchers from the U.S. Army Combat Capabilities Development Command's Army Research Laboratory (ARL) partnered with Virginia Tech to de...

Read More

Cybercrime By The Numbers CYBERCRIME BY THE NUMBERS

infographic

Jan 03, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber...

Read More

How has the world of cybersecurity evolved in the last decade? HOW HAS THE WORLD OF CYBERSECURITY EVOLVED IN THE LAST DECADE?

video

Jan 03, 2020

Gearoid Terry, vice-president of enterprise cybersecurity at Fidelity Investments, draws on his wealth of experience in the growing field to give his take on the most pressing cybersecurity threats for enterprises today and the steps organisations need to take to combat them.

Read More

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security SYMANTEC WHITE PAPER - THE CYBER RESILIENCE BLUEPRINT: A NEW PERSPECTIVE ON SECURITY

whitepaper

Jan 02, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat...

Read More

Hospitality Company Landry HOSPITALITY COMPANY LANDRY'S INC. IDENTIFIES MALWARE ON PAYMENT SYSTEM

blog article

Jan 02, 2020

Landry's, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment and gaming corporation, has reported that it identified malware on its payment processing system. Headquartered in Houston, Texas. Landry's, Inc. owns and operates more than 600 restaurants, hotels, ...

Read More

Navigating the cyber security marketplace NAVIGATING THE CYBER SECURITY MARKETPLACE

infographic

Jan 01, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More

Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020 MAKE THESE SECURITY NEW YEAR’S RESOLUTIONS TO BOLSTER YOUR CYBERSECURITY IN 2020

blog article

Jan 01, 2020

The new year has arrived, and with glasses raised and timeless stories recounted, we can now look to that well-meaning but often short-lived practice we know too well: setting resolutions.Industry leaders often make fulsome commitments to changing systems for the better, fully intending to carry thr...

Read More

Virtual Reality Meets Provider Reality VIRTUAL REALITY MEETS PROVIDER REALITY

whitepaper

Dec 30, 2019

Will 2019 be the tipping point for healthcare-centered virtual and augmented reality tech, or a wait-and-see year reserved for early adopters? Three key indicators provide the clues and contextual evidence your organization needs to confidently pull the trigger on embracing augmented and virtual rea...

Read More

A SIMPLE IDEA SOLVING COMPLEX PROBLEMS A SIMPLE IDEA SOLVING COMPLEX PROBLEMS

whitepaper

Dec 30, 2019

Meaningful Use, HIPAA, HITECH, value-based care, ACA — the list goes on and on. Regardless of whether it’s a government regulation or market demand, the mandates on IT in healthcare organizations are at odds with each other: Deploy more advanced, usable, secure applications while also reducing IT in...

Read More

Ransomware Attackers May Lurk for Months, FBI Warns RANSOMWARE ATTACKERS MAY LURK FOR MONTHS, FBI WARNS

blog article

Dec 27, 2019

Warning: Attackers wielding LockerGoga and MegaCortex ransomware have been hitting large corporate networks, sometimes lingering for months before deploying crypto-locking malware. That's according to a recent FBI flash alert, marked "TLP:AMBER" - restricted to receiving organizations....

Read More

Here are the top cybersecurity predictions for 2020 HERE ARE THE TOP CYBERSECURITY PREDICTIONS FOR 2020

blog article

Dec 27, 2019

As 2019 comes to an end, cybersecurity experts are preparing for a new year—and a new decade—and all the cyber scams, breaches, attacks and privacy concerns that threaten consumers and businesses. CyberScout, an industry leader in cyber insurance, data security, and identity theft protec...

Read More

I.T. Security Isn’t Just More Important Than Ever It’s The Most Important Thing, Period I.T. SECURITY ISN’T JUST MORE IMPORTANT THAN EVER IT’S THE MOST IMPORTANT THING, PERIOD

whitepaper

Dec 27, 2019

Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield powered by Intel® vPro™ Platform is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays sec...

Read More

Going Viral: The Challenges & Urgency of Managing TPRM GOING VIRAL: THE CHALLENGES & URGENCY OF MANAGING TPRM

whitepaper

Dec 27, 2019

Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems. It is difficult enough for organizations to manage their own internal vulnerabilities, but even more challenging to ensure that every vendor across their supply chain has strong security practic...

Read More

Cybersecurity Benchmarking & Security Performance Management CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT

whitepaper

Dec 27, 2019

Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems. The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide accurate data...

Read More

Collaboration: The Missing Piece in Enterprise Risk Management COLLABORATION: THE MISSING PIECE IN ENTERPRISE RISK MANAGEMENT

whitepaper

Dec 27, 2019

Enterprise risk management programs are maturing, and the role of the chief risk officer is becoming more popular. However, risk management professionals rarely have a direct role in business decision making. In fact, only 29% of Board members substantively discuss top risk exposures in a formal man...

Read More

An Expanding Attack Surface: 5 Tips to Manage Third-Party Risk AN EXPANDING ATTACK SURFACE: 5 TIPS TO MANAGE THIRD-PARTY RISK

whitepaper

Dec 27, 2019

As organizations become increasingly reliant on third-parties, they expand their attack surface & put themselves at risk. Today's digital environment offers unprecedented opportunities for organizations to improve the customer experience and efficiency of their operations. At the same time, expandin...

Read More

EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY

blog article

Dec 26, 2019

Cyberthreat actors are individuals or groups who work with the malicious intent of taking advantage of vulnerabilities and gaining unauthorized access to information systems. They intend to affect the victim’s data, systems, networks, or devices. The internet is an effective tool that they use...

Read More

Dangers of new tech: Top cybersecurity trends that will shape 2020 DANGERS OF NEW TECH: TOP CYBERSECURITY TRENDS THAT WILL SHAPE 2020

blog article

Dec 26, 2019

As we HEAD into a new decade, there’s no doubt that attackers will try to use innovation against us but determining where they will focus is always a challenge. Here are the top security trends that will impact both businesses and consumers in 2020. Drones open up new pathway for intelligence ...

Read More

Cyber attack infographic CYBER ATTACK INFOGRAPHIC

infographic

Dec 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More

Healthcare Cybersecurity: Reducing the Risk of Data Breaches HEALTHCARE CYBERSECURITY: REDUCING THE RISK OF DATA BREACHES

blog article

Dec 22, 2019

2019 has a bad year for healthcare security breaches. Over 30 million patients in the U.S. have been affected by data breaches so far this year. The majority of attacks have been traced back to third-party vendors and phishing attacks. Furthermore, the industry at large is still dragging its heels o...

Read More

2019 Cyber Etiquette: A Guide To Today’s Top Cyber Threats 2019 CYBER ETIQUETTE: A GUIDE TO TODAY’S TOP CYBER THREATS

infographic

Dec 20, 2019

The best detection and response solutions provide
deep visibility to secure and investigate potential risk.
Greater automation and contextualization of security
events brings more informed decision-making, faster
triage and effective remediation of threats.

Read More

Cyber Security Awareness CYBER SECURITY AWARENESS

infographic

Dec 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More

Harvesting Botnets for Unusual Data HARVESTING BOTNETS FOR UNUSUAL DATA

video

Dec 19, 2019

To all who joined us for FireEye Cyber Defense Summit 2019, thank you for helping us realize our goal for this year’s conference – Empowering Defenders. We had a record number of registrations – more than 2,400 – and there were attendees from 45 countries and more than 1,000 ...

Read More

PROMOTING BETTER CYBERSECURITY PROMOTING BETTER CYBERSECURITY

whitepaper

Dec 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have...

Read More

Ransomware Risk Management: 11 Essential Steps RANSOMWARE RISK MANAGEMENT: 11 ESSENTIAL STEPS

blog article

Dec 18, 2019

There's been a lot of discussion within the InfoSec community about ransomware - why it has been increasing, whether ransoms should be paid and how to mitigate this rapidly growing threat. The culprit that opens the door to these attacks, apparently including last week's city of New Orleans ...

Read More

Worst passwords of 2019: Are you using one of them? WORST PASSWORDS OF 2019: ARE YOU USING ONE OF THEM?

blog article

Dec 18, 2019

SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of events, password has for the first time in the list’s history been knocked out of the top two spots.“Invoking the n...

Read More

Cybersecurity experts explain their work to children CYBERSECURITY EXPERTS EXPLAIN THEIR WORK TO CHILDREN

video

Dec 18, 2019

Everyone occasionally has difficulties communicating, even when talking about the topics you’re expert in, and even explaining them to adults. Explaining cybersecurity concepts to children adds layers of complexity, but it’s important to understand the risks behind ignorance.

Read More

Decade retrospective: Cybersecurity from 2010 to 2019 DECADE RETROSPECTIVE: CYBERSECURITY FROM 2010 TO 2019

blog article

Dec 18, 2019

Yes, technically, decades begin in years that end in one, but it's easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn't work. Devices blew up due to malware or adware, and users got annoyed whe...

Read More

Cyber Security for Business CYBER SECURITY FOR BUSINESS

whitepaper

Dec 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations agai...

Read More

Cyberattack compromises data of 15 million LifeLabs customers CYBERATTACK COMPROMISES DATA OF 15 MILLION LIFELABS CUSTOMERS

video

Dec 17, 2019

LifeLabs, one of Canada's biggest laboratory testing companies, has been hit by hackers, who held the personal information of 15 million Canadians for ransom.

Read More

10 cyber security trends to look out for in 2020 10 CYBER SECURITY TRENDS TO LOOK OUT FOR IN 2020

blog article

Dec 17, 2019

When looking for possible cyber security trends in 2020, it is clear to see that 2019 was an interesting year for all things cyber security. It was the year that brought major breaches pretty much every week. Recently, it was found that charities reported over 100 data breaches to the ICO in the sec...

Read More

Almost half of companies say cybersecurity readiness has improved in the past year ALMOST HALF OF COMPANIES SAY CYBERSECURITY READINESS HAS IMPROVED IN THE PAST YEAR

infographic

Dec 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were re...

Read More

Closing a Critical Gap in Cybersecurity CLOSING A CRITICAL GAP IN CYBERSECURITY

blog article

Dec 16, 2019

Last year, faced with rising threats in cyberspace, Congress established the nation’s first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). We serve as the nation’s risk adviser, which means we’re the agency responsible for working w...

Read More

The Cyber Resilience Blueprint: A New Perspective on Security THE CYBER RESILIENCE BLUEPRINT: A NEW PERSPECTIVE ON SECURITY

whitepaper

Dec 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat...

Read More

Cloud-native security practicesin IBM Cloud CLOUD-NATIVE SECURITY PRACTICESIN IBM CLOUD

whitepaper

Dec 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our clo...

Read More

THE ROLE OF AI IN CYBERSECURITY THE ROLE OF AI IN CYBERSECURITY

blog article

Dec 13, 2019

Emerging technologies put cybersecurity at risk. Even the new advancements in defensive strategies of security professionals fail at some point. Besides, as offensive-defensive strategies and innovations are running in a never-ending cycle, the complexity and volume of cyberattacks have increased. C...

Read More

Cybersecurity Whitepaper 2018 CYBERSECURITY WHITEPAPER 2018

whitepaper

Dec 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats ...

Read More

Machine Learning in Cybersecurity: 7 Questions for Decision Makers MACHINE LEARNING IN CYBERSECURITY: 7 QUESTIONS FOR DECISION MAKERS

video

Dec 12, 2019

April Galyardt, Angela Horneman, and Jonathan Spring discuss seven key questions that managers and decision makers should ask about machine learning to effectively solve cybersecurity problems.

Read More

Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud MAINTAIN CONTROL OF YOUR MOST SENSITIVE CONTENT WITH A PRIVATE OR ON-PREMISES CLOUD

blog article

Dec 12, 2019

Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival insti...

Read More

Sharkgate Whitepaper SHARKGATE WHITEPAPER

whitepaper

Dec 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a ne...

Read More

The Crucial role of Cyber security and Artificial Intelligence (AI) THE CRUCIAL ROLE OF CYBER SECURITY AND ARTIFICIAL INTELLIGENCE (AI)

blog article

Dec 11, 2019

Artificial intelligence (AI) is accepting the situation as a warrior against digital threats over the globe. It has gotten mainstream in military space, yet security organizations are likewise consolidating AI technologies for using deep learning to discover likenesses and differences within a data ...

Read More

How to test employee cyber competence through pen-testing HOW TO TEST EMPLOYEE CYBER COMPETENCE THROUGH PEN-TESTING

blog article

Dec 11, 2019

Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help get supposedly ill-gotten cash out of their own country into a safe bank, offering a percentage of the money for their participation. While “Nigerian prince” emails have been scamming people...

Read More

VIRSEC ® SECURITY PLATFORM VIRSEC ® SECURITY PLATFORM

whitepaper

Dec 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate pr...

Read More

NIST Cybersecurity Framework NIST CYBERSECURITY FRAMEWORK

video

Dec 10, 2019

The NIST Cybersecurity Framework centers on five controls, Identify, Protect, Detect, Respond, and Recover.

Read More

CYBERSECURITY AND AI IN TODAY’S WORLD CYBERSECURITY AND AI IN TODAY’S WORLD

blog article

Dec 10, 2019

In an always advancing cyber threat landscape where antivirus programming and firewalls are viewed as tools of antiquity, companies are currently searching for all the more technologically advanced methods for protecting classified and sensitive data. Artificial intelligence (AI) is accepting the si...

Read More

Cyber Security Expert says AI becoming Sentient is a Concern CYBER SECURITY EXPERT SAYS AI BECOMING SENTIENT IS A CONCERN

video

Dec 09, 2019

Flow Of Wisdom with Sean Anthony is a syndicated, ground-breaking radio talk show which covers subjects such as Technology, AI, Artificial Intelligence, Facebook, Social Media, social engineering, psychology and other subjects that don't usually get covered on most media platforms.

Read More

Government GOVERNMENT'S CYBER SECURITY STRATEGY PANEL 'MISSING A BIT OF DIVERSITY': AUSTCYBER CEO

blog article

Dec 09, 2019

An advisory panel that will guide the Australian government's new security strategy "does not reflect the full breadth of challenges facing the country," according to AustCyber CEO, Michelle Price.The panel selection has attracted different points of view from across the tech sector wi...

Read More

Facebook Alleges Company Infiltrated User Accounts for Ad Fraud FACEBOOK ALLEGES COMPANY INFILTRATED USER ACCOUNTS FOR AD FRAUD

blog article

Dec 06, 2019

Facebook has sued a Chinese company that it alleges used malware to compromise hundreds of thousands of user accounts – and then used them to run “deceptive ads” promoting counterfeit goods. The company in question is Hong Kong-based ILikeAd Media International Company Ltd., which ...

Read More

IT Audit-IT Security Infographic IT AUDIT-IT SECURITY INFOGRAPHIC

infographic

Dec 05, 2019

Cyber security has become a prevalent issue facing most organizations—one that companies recognize as an enterprise-wide issue requiring thoughtful attention. Investments in controls are necessary to protect organizations from increasingly sophisticated and widely available attack methods. Int...

Read More

AWS Best Practices for DDoS Resiliency AWS BEST PRACTICES FOR DDOS RESILIENCY

whitepaper

Dec 05, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary dir...

Read More

Face scanning – privacy concern or identity protection? FACE SCANNING – PRIVACY CONCERN OR IDENTITY PROTECTION?

blog article

Dec 05, 2019

On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial reaction, like mine, could be that this is an infringement of privacy rights. After all, why does any gover...

Read More

Project Blackfin: Automated Breach Detection Using Intelligent Agents PROJECT BLACKFIN: AUTOMATED BREACH DETECTION USING INTELLIGENT AGENTS

whitepaper

Dec 04, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes...

Read More

What are the major cyber security challenges we face today? WHAT ARE THE MAJOR CYBER SECURITY CHALLENGES WE FACE TODAY?

video

Dec 04, 2019

Cyber security experts from the Birmingham Centre for Cyber Security and Privacy and industry discuss the major challenges we face in securing our devices and systems in an ever-more connected world.

Read More

Digital Privacy vs. Cybersecurity: The Confusing Complexity of Information Security in 2020 DIGITAL PRIVACY VS. CYBERSECURITY: THE CONFUSING COMPLEXITY OF INFORMATION SECURITY IN 2020

blog article

Dec 04, 2019

There is a small and potentially tumultuous revolution building on the horizon of 2020. Ironically, it’s a revolution very few people on the street are even aware of but literally every single corporation around the globe currently sits in finger-biting, hand-wringing anticipation: is it ready...

Read More

A Lifeline: Patient Safety and Cybersecurity A LIFELINE: PATIENT SAFETY AND CYBERSECURITY

whitepaper

Dec 03, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More

Cyber Security Checklist for 2019 CYBER SECURITY CHECKLIST FOR 2019

infographic

Dec 03, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more im...

Read More

A strong cybersecurity strategy for device manufacturers A STRONG CYBERSECURITY STRATEGY FOR DEVICE MANUFACTURERS

video

Dec 03, 2019

The Thales Trusted Key Manager delivers the industry’s most advanced encryption tools and provides a security interface that interactes with a variety of IoT platforms through APIs. A unique platform to manage the security of large fleets of devices from various manufacturers.

Read More

How AI is Transforming the Cybersecurity Landscape  Gabriel Tremblay HOW AI IS TRANSFORMING THE CYBERSECURITY LANDSCAPE GABRIEL TREMBLAY

video

Dec 02, 2019

In this episode of Devo Talks, our guest Gabriel Tremblay shares some insight on how his company, Delve Labs is using artificial intelligence to tackle cybersecurity.  Before Gabriel was CEO of Delve Labs, he had the opportunity to help organize and start NorthSec, the largest cybersecurity con...

Read More

61% of malicious ads target Windows users 61% OF MALICIOUS ADS TARGET WINDOWS USERS

blog article

Dec 02, 2019

Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon. The company said that based on data gathered by its internal tools, 61% of the malicious ads they've observed from between July 11 and November 22, 2019 were ...

Read More

What Does IMDRF WHAT DOES IMDRF'S NEW CYBERSECURITY GUIDANCE MEAN FOR YOU?

blog article

Dec 02, 2019

In the age of connectivity, cybersecurity has become critical to all stakeholders in the medical device field. Different federal agencies in the United States (U.S.), as well as agencies across the globe, have begun to address this issue through regulatory guidance and enforcement action. The U.S. h...

Read More

Cyber Security What Makes a Strong Password CYBER SECURITY WHAT MAKES A STRONG PASSWORD

infographic

Dec 01, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Warring State - China WARRING STATE - CHINA'S CYBERSECURITY STRATEGY

whitepaper

Dec 01, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generat...

Read More

Cognizant—2019 Cyber Security Trends COGNIZANT—2019 CYBER SECURITY TRENDS

infographic

Nov 30, 2019

The European union ‘s general data protection regulation covers more than 500 million citizens in 28 countries. Devising and executing a compliance plan is a significant challenge, as shown by the fact that 72% .

Read More

MITRE, CISA, DHS Announce 25 Most Dangerous Software Errors MITRE, CISA, DHS ANNOUNCE 25 MOST DANGEROUS SOFTWARE ERRORS

blog article

Nov 29, 2019

The Common Weakness Enumeration (CWE™) released its Top 25 Most Dangerous Software Errors (CWE Top 25), a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software."These weaknesses are often easy to find and exploit. They are d...

Read More

DeltaV SIS™ and Cybersecurity DELTAV SIS™ AND CYBERSECURITY

whitepaper

Nov 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for...

Read More

The Need for a Security Culture to Combat Cyber Threats THE NEED FOR A SECURITY CULTURE TO COMBAT CYBER THREATS

blog article

Nov 28, 2019

The shipping industry is the lifeblood of the worldwide economy. Through the global maritime community, vessels and port facilities are highly dependent on sophisticated technologies, and vessels are increasingly using systems that depending on digitization, digitalization, integration and automatio...

Read More

PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING

blog article

Nov 27, 2019

Ignorance is the most commonly blamed factor in large-scale cyberattacks, but it’s worth remembering that there are at least two types of ignorance, one being the lack of threat sharing. It’s true that many employees – especially in the public sector – remain ill-informed whe...

Read More

Tech SA: UTSA could benefit from cybersecurity bill TECH SA: UTSA COULD BENEFIT FROM CYBERSECURITY BILL

video

Nov 26, 2019

A bill would allow DHS to work with five universities to train state and local governments on cybersecurity.

Read More

Michigan Minds: Cyber Security and Privacy MICHIGAN MINDS: CYBER SECURITY AND PRIVACY

video

Nov 26, 2019

Created by #UMSocial within the Office of the Vice President for Communications at the University of Michigan.

Read More

GuardSight - NIST Cybersecurity Framework GUARDSIGHT - NIST CYBERSECURITY FRAMEWORK

video

Nov 26, 2019

GuardSight is a cybersecurity consulting firm and an established provider of specialized cybersecurity services. Our cybersecurity protection packages, automation, and data science techniques compliment our elite and reliable cybersecurity experts.

Read More

5 Digital Threats to Watch Out for on Black Friday 5 DIGITAL THREATS TO WATCH OUT FOR ON BLACK FRIDAY

blog article

Nov 26, 2019

The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food and good company. Once they’ve put away the leftovers, many Americans don their coats and head to the malls for Black Friday. The official start to the Chri...

Read More

Spear Phishing: Important Things You Should Know to Stay Safe SPEAR PHISHING: IMPORTANT THINGS YOU SHOULD KNOW TO STAY SAFE

blog article

Nov 26, 2019

It’s something that most think while on a break from work, only to be caught up by their duties and responsibilities soon. They get the better of them and the question remains unanswered. It seems relatable, right? I am pretty sure it is. But hey! Let’s concentrate on the answer and it&r...

Read More

The Importance of Cybersecurity Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY THREAT DETECTION FOR UTILITIES

whitepaper

Nov 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

Cybersecurity reporter debunks Trump CYBERSECURITY REPORTER DEBUNKS TRUMP'S CROWDSTRIKE CLAIMS

video

Nov 25, 2019

New York Times cybersecurity reporter Nicole Perlroth speaks to CNN's Jim Sciutto about CrowdStrike conspiracy theories and how they relate not only to the 2016 presidential election, but the upcoming 2020 race as well.

Read More

Traversing The Route From Technology To Privacy Best Practice Guide TRAVERSING THE ROUTE FROM TECHNOLOGY TO PRIVACY BEST PRACTICE GUIDE

whitepaper

Nov 25, 2019

Balancing digital transformation efforts with staying compliant and applying relevant privacy policies requires a real survival guide. In this set of Best Practices you’ll find actionable steps to implement in your organisation to: Prepare for digital transformation Explore new privacy regulations D...

Read More

LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET

blog article

Nov 24, 2019

From Florida to a group of cities in Texas, even Baltimore to Atlanta, the frequency of ransomware attacks against local governments is rapidly rising. A recent report from Barracuda Networks confirmed that out of hundreds of attacks, nearly two-third of ransomware attacks targeted local government ...

Read More

Security lapse exposes personal data of 6,500 Singapore accountants SECURITY LAPSE EXPOSES PERSONAL DATA OF 6,500 SINGAPORE ACCOUNTANTS

blog article

Nov 22, 2019

A folder containing personal data of 6,541 accountants in Singapore was "inadvertently" sent to multiple parties, in a security lapse that was uncovered only months after when a review was conducted. The incident exposed personal details such as names, national identification number, date ...

Read More

Aprimo Workspace Experiences - Striking and Simple APRIMO WORKSPACE EXPERIENCES - STRIKING AND SIMPLE

video

Nov 21, 2019

Watch Aprimo's modern workspaces in action. For the digital workplace, there's robust data visualization, agile features and more together in a frictionless enterprise experience. See your content, operations and performance through a whole new lens!

Read More

4G to 5G Migration - The Changing Role of Security  5G Cybersecurity 4G TO 5G MIGRATION - THE CHANGING ROLE OF SECURITY 5G CYBERSECURITY

video

Nov 21, 2019

Fortinet’s security solutions for 4G and 5G provide a common set of security tools and solutions enabling a safe transition from 4G to 5G and the secure delivery of 5G’s unique use cases such as MEC and Network Slicing.

Read More

Think Auburn: Cybersecurity THINK AUBURN: CYBERSECURITY

video

Nov 20, 2019

Auburn University and the Samuel Ginn College of Engineering are taking the lead as an institution on the forefront of cybersecurity research and professional preparedness in the industry.

Read More

Cybersecurity: We Are All Stakeholders CYBERSECURITY: WE ARE ALL STAKEHOLDERS

video

Nov 20, 2019

According to Scott Jamar, VP of Industry Relations, the best approach to security is to view all networks as potential risks. When it comes to cybersecurity, we all have roles to play.

Read More

The Future of Security is Converged THE FUTURE OF SECURITY IS CONVERGED

blog article

Nov 20, 2019

Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT. However, as threats evolve and as bad actors become more intelligent, and with the goal of being proac...

Read More

Skeye - Cybersecurity for Medical Devices SKEYE - CYBERSECURITY FOR MEDICAL DEVICES

video

Nov 19, 2019

Skeye is a vendor-agnostic cybersecurity solution for networked medical devices that leverages medical device expertise, artificial intelligence, systematic processes, and security professionals to help keep your medical devices resilient in the face of cybersecurity risk.

Read More

Alex Stamos: Creating a Thorough Cyber Defense System ALEX STAMOS: CREATING A THOROUGH CYBER DEFENSE SYSTEM

video

Nov 19, 2019

Alex Stamos is the former Chief of Security at Facebook & an adjunct Professor at Stanford. Stamos is a cybersecurity expert, business leader and entrepreneur whose career has focused on improving the security and safety of the Internet. In this video, Stamos talks about the US's offensive a...

Read More

2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS 2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS

blog article

Nov 19, 2019

Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a ...

Read More

SMART CITIES AND CYBERSECURITY: THE ESSENTIALS SMART CITIES AND CYBERSECURITY: THE ESSENTIALS

blog article

Nov 19, 2019

With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag...

Read More

2020 Workplace Learning Trends Report: The Skills of the Future 2020 WORKPLACE LEARNING TRENDS REPORT: THE SKILLS OF THE FUTURE

whitepaper

Nov 19, 2019

With large-scale technology disruption, organizations will need to respond in a transformational way. It means rethinking how organizations approach workforce skills and talent management. This report highlights the future skills your organization will need in 2020 and how you can prepare your workf...

Read More

The Navy THE NAVY'S NETWORKS ARE VULNERABLE TO CYBER ATTACKS IT'S TIME FOR ACTION

blog article

Nov 18, 2019

The threat to the U.S. Navy from cyber intrusion has become a crisis. Hackers, particularly those from Russia and China, are not limiting themselves to attacks on computers and networks. Now they are engaged in a massive assault on the entire Navy enterprise, including ships, weapons systems, resear...

Read More

2020 Workplace Learning Trends Report The Skills of the Future 2020 WORKPLACE LEARNING TRENDS REPORT THE SKILLS OF THE FUTURE

whitepaper

Nov 18, 2019

With large-scale technology disruption, organizations will need to respond in a transformational way. It means rethinking how organizations approach workforce skills and talent management. This report highlights the future skills your organization will need in 2020 and how you can prepare your workf...

Read More

Mid-Year Threat Landscape Report MID-YEAR THREAT LANDSCAPE REPORT

whitepaper

Nov 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the prolif...

Read More

Awesome Cyber Security Facts - Infographic AWESOME CYBER SECURITY FACTS - INFOGRAPHIC

whitepaper

Nov 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More

What Is a Value Chain for Security WHAT IS A VALUE CHAIN FOR SECURITY

whitepaper

Nov 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More

VA continues to struggle with information security, watchdogs say VA CONTINUES TO STRUGGLE WITH INFORMATION SECURITY, WATCHDOGS SAY

blog article

Nov 15, 2019

Two watchdog agencies told lawmakers Thursday that the Veterans Affairs Department continues to struggle with cybersecurity issues, despite recent improvements. Audits have identified numerous information security vulnerabilities—and insufficient attempts to remedy them—at the VA, leader...

Read More

Sept principes essentiels de la sécurité et de la confidentialité dans le cloud SEPT PRINCIPES ESSENTIELS DE LA SÉCURITÉ ET DE LA CONFIDENTIALITÉ DANS LE CLOUD

whitepaper

Nov 15, 2019

Parcourir les dimensions de la sécurité dans le cloud et appliquer les meilleures pratiques dans un contexte réglementaire en constante évolution sont des tâches ardues et les enjeux sont élevés. En outre, plus votre infrastructure est complexe, plus il est difficile de respecter la conformité, puis...

Read More

Maximisez vos investissements Power BI, Tableau et Qlik MAXIMISEZ VOS INVESTISSEMENTS POWER BI, TABLEAU ET QLIK

whitepaper

Nov 15, 2019

L’investissement dans des outils analytiques - tels que Power BI, Tableau ou Qlik - amorce la transformation de l’entreprise. La façon dont vous amplifiez votre investissement dans les outils et procédures analytiques détermine le cours de votre activité pour les années à venir. Dans Maximisez vos i...

Read More

Quatre façons de maximiser vos investissements en Business Intelligence QUATRE FAÇONS DE MAXIMISER VOS INVESTISSEMENTS EN BUSINESS INTELLIGENCE

whitepaper

Nov 15, 2019

Si votre entreprise ressemble à beaucoup d’autres, vous cherchez des moyens de valoriser au maximum les investissements que vous avez réalisés dans votre programme de données. Cela peut inclure l’implémentation de la sécurité des données, l’unification des silos de données et la fourniture d’analyti...

Read More

MEASURING ORGANIZATION’S CYBERSECURITY MEASURING ORGANIZATION’S CYBERSECURITY

blog article

Nov 15, 2019

No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought...

Read More

Cybersecurity: Are Nation State cybersecurity threats real? CYBERSECURITY: ARE NATION STATE CYBERSECURITY THREATS REAL?

video

Nov 14, 2019

Brad Prent, senior security consultant, ENCS discusses the nation state cybersecurity threats, the steps the energy industry can take to protect itself and the future evolution of cybersecurity.

Read More

Infographic - 2019 SonicWall Cyber Threat Report INFOGRAPHIC - 2019 SONICWALL CYBER THREAT REPORT

infographic

Nov 14, 2019

A cyberattack is personal. At its core, they strip organizations, their employees, partners and customers of intellectual property, identities, privacy, reputation and monetary assets. Follow the attack trends to understand how and where cybercriminals are targeting enterprises, government agencies ...

Read More

Balancing Patient Engagement and Awareness with Medical Device Cybersecurity BALANCING PATIENT ENGAGEMENT AND AWARENESS WITH MEDICAL DEVICE CYBERSECURITY

blog article

Nov 14, 2019

Medical devices are increasingly more advanced and interconnected, sharing information via Wi-Fi, the internet, our phones and across hospital networks. While the software and networking features behind these devices can support safer, more convenient and timely health care delivery, they also can i...

Read More

Perils of the open office PERILS OF THE OPEN OFFICE

infographic

Nov 13, 2019

Open offices are often loud, chaotic, and full of distractions that keep your team from getting work done. That’s where we come in, with solutions that avert open office perils. Open offices are often loud, chaotic, and full of distractions that keep your team from getting work done. That&rsqu...

Read More

Cyber Security: Defending your digital business CYBER SECURITY: DEFENDING YOUR DIGITAL BUSINESS

whitepaper

Nov 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, busin...

Read More

Enterprises Need to Focus on Cybersecurity Strategies Around 5G ENTERPRISES NEED TO FOCUS ON CYBERSECURITY STRATEGIES AROUND 5G

blog article

Nov 13, 2019

Companies need to implement technologies like virtualization and automation to protect themselves from cyber threats that 5G will bring. AT&T has prepared the report after surveying 704 security practitioners from North America, Australia, and the UK, to know how prepared enterprises are for the...

Read More

CYBER SECURITY FOR ECONOMIC GROWTH CYBER SECURITY FOR ECONOMIC GROWTH

video

Nov 12, 2019

This year’s Cyber Defense East Africa conference has been centered around addressing issues of cyber security in a bid to tackle digital insecurities.

Read More

Jeremy Corbyn says timing of Labour cyber-attack is suspicious JEREMY CORBYN SAYS TIMING OF LABOUR CYBER-ATTACK IS SUSPICIOUS

video

Nov 12, 2019

The Labour leader has said of the cyber-attack on the party's digital platform: ‘If this was a sign of things to come in this election, I feel very nervous.’ The party said it had experienced a ‘sophisticated and large-scale cyber-attack’ on its digital systems from an un...

Read More

Tips for Staying Safe Online TIPS FOR STAYING SAFE ONLINE

blog article

Nov 12, 2019

Almost one-fifth of organisations in Ireland have reported at least one technology-related security incident in the last 12 months. According to the Central Statistics Office (CSO), these attacks can have significant consequences, with 5% reporting that it resulted in the destruction or corruption o...

Read More

Hire hackers, halt cyber attacks and safeguard your data HIRE HACKERS, HALT CYBER ATTACKS AND SAFEGUARD YOUR DATA

blog article

Nov 12, 2019

At a time when cyber attacks on businesses across industries are multiplying as they go digital, joining hacker-powered bug bounty and vulnerability disclosure programmes is the key to minimise such incidents and safeguard your key data, a top cyber security officer said on Tuesday.Hacker-powered se...

Read More

POLY HELPS EMPOWER CONTACT CENTER WORKERS POLY HELPS EMPOWER CONTACT CENTER WORKERS

blog article

Nov 11, 2019

It’s a well-documented trend that the rise of digital channels such as webchat, apps, FAQs, etc., has led to a change in the way contact centers handle interactions. The routine, “easy” interactions are now handled by self-service channels. Deflecting these low-value interactions h...

Read More

Hyperspecialization in cybersecurity Cyber Work Podcast HYPERSPECIALIZATION IN CYBERSECURITY CYBER WORK PODCAST

video

Nov 11, 2019

John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding.

Read More

AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G AT&T CYBERSECURITY INSIGHTS™ REPORT: SECURITY AT THE SPEED OF 5G

blog article

Nov 11, 2019

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model.  This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professiona...

Read More

How we can make Americans safer online HOW WE CAN MAKE AMERICANS SAFER ONLINE

blog article

Nov 11, 2019

Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of time and energy has been devoted to improving cybersecurity and cyber hygiene. Sadly, despite thos...

Read More

Councils lack resources to manage cyber threats COUNCILS LACK RESOURCES TO MANAGE CYBER THREATS

blog article

Nov 11, 2019

Local Government Professionals Australia has made a submission to the federal government’s 2020 Cyber Security Strategy identifying ways it can support local government. A report surveying local government CEOs and general managers, JLT Public Sector Risk Report 2019, by risk consultancy JLT i...

Read More

GBM Security Whitepaper GBM SECURITY WHITEPAPER

whitepaper

Nov 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation ...

Read More

Cybersecurity and Cyber Resilience Perception Gaps CYBERSECURITY AND CYBER RESILIENCE PERCEPTION GAPS

video

Nov 10, 2019

Protecting IT against cyber threats is a strategic priority for businesses. But as IT ecosystems grow beyond the four walls of your organization, there may be a number of grey areas on security and resilience responsibilities.

Read More

Master of Science in Cybersecurity Law MASTER OF SCIENCE IN CYBERSECURITY LAW

video

Nov 08, 2019

Markus Rauschecker, Director of the Cybersecurity Program at Maryland Carey Law's Center for Health and Homeland Security discusses the Master of Science in Law program.

Read More

7 truths to improve your software security program 7 TRUTHS TO IMPROVE YOUR SOFTWARE SECURITY PROGRAM

infographic

Nov 07, 2019

The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix Ten years of data gathered from 100+ initiatives provide a bird’s-eye view of software security. You can apply lessons from the Building Securit...

Read More

Is Working in Cybersecurity Fun? IS WORKING IN CYBERSECURITY FUN?

video

Nov 07, 2019

I share what cybersecurity professionals had to say about what they found fun and enjoyable in their work.

Read More

Protect the Business from Edge to AI with Cloudera Cybersecurity PROTECT THE BUSINESS FROM EDGE TO AI WITH CLOUDERA CYBERSECURITY

blog article

Nov 07, 2019

Gartner estimates 30x connected device growth by 2020.  Faster 5G networks bringing an explosion of inexpensive, connected devices. This enables new and more innovative applications and capabilities to improve customer experience.  However, all these new applications and connections also b...

Read More

10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME 10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME

blog article

Nov 06, 2019

When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year. Being cautious while tending to financial transactions won’t ensure that you are cyber safe. ...

Read More

IoT Cybersecurity vision 2018-2019 IOT CYBERSECURITY VISION 2018-2019

whitepaper

Nov 06, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by s...

Read More

This Website Has Solved Cybersecurity THIS WEBSITE HAS SOLVED CYBERSECURITY

blog article

Nov 06, 2019

Big companies that hold our personal data get hacked almost every day, but most don’t really know how to deal with getting hacked, especially when it comes to telling users what happened. If you’ve read some data breach disclosures or notices, you know the classic “we take your pri...

Read More

Facebook Privacy Breach: 100 Developers Improperly Accessed Data FACEBOOK PRIVACY BREACH: 100 DEVELOPERS IMPROPERLY ACCESSED DATA

blog article

Nov 06, 2019

Facebook said that 100 third-party app developers have improperly accessed the names and profile pictures of members in various Facebook groups – data that was restricted in 2018 by the platform after its Cambridge Analytica privacy snafu. Facebook said that the developers – including 11...

Read More

Get Out! The FUD Is Coming from the Inside GET OUT! THE FUD IS COMING FROM THE INSIDE

blog article

Nov 05, 2019

On LinkedIn, Ron C. of CoreSolutions Software said, “Cybersecurity is no longer just a technical problem. It’s now more of a people problem! So why aren’t businesses prioritizing security awareness training for their staff?” There was a massive response and mixed agreement. R...

Read More

Are You Prepared for a Ransomware Attack? ARE YOU PREPARED FOR A RANSOMWARE ATTACK?

blog article

Nov 04, 2019

What if you walked into your office tomorrow and you couldn’t access any of your data–and neither could anyone else on your network? For a growing number of businesses and local governments, that nightmare has become a reality this year thanks to a growing number of ransomware attacks. I...

Read More

Insider tips from a cybersecurity CEO  Cyber Work Podcast INSIDER TIPS FROM A CYBERSECURITY CEO CYBER WORK PODCAST

video

Nov 04, 2019

Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of transparency in job listings and ways to fix the cyber skills gap.

Read More

Recoding Capabilities: Cyber Security  GOFORE RECODING CAPABILITIES: CYBER SECURITY GOFORE

video

Nov 04, 2019

Buying cyber security is like buying an insurance. You have to think ahead to avoid disasters. Gofore is an expert in digitalisation. We help our customers to build sustainable, and safe, digital solutions. If you are ready to your system security audit, visit our website gofore.com. Let's make ...

Read More

Healthcare cyberattacks raise questions about cybersecurity training HEALTHCARE CYBERATTACKS RAISE QUESTIONS ABOUT CYBERSECURITY TRAINING

blog article

Nov 04, 2019

A recent search showed the Office for Civil Rights was investigating 548 such breaches in the last 24 months. These included health information breaches at hospitals, cancer centers, hospice facilities, group practices and more.Perhaps as concerning as the rate at which these healthcare cyberattacks...

Read More

CEOs on their Digital Strategy and Cyber Security CEOS ON THEIR DIGITAL STRATEGY AND CYBER SECURITY

video

Nov 03, 2019

Over half of CEOs say that a strong cyber strategy is critical to building trust with key stakeholders. Hear more from Tim Wood, Partner- Digital and Innovation at KPMG Lower Gulf in this video.

Read More

INFOGRAPHIC: CYBER SECURITY TRENDS FOR 2019 INFOGRAPHIC: CYBER SECURITY TRENDS FOR 2019

infographic

Nov 01, 2019

Each year, DXC Technology’s security advisors, technologists and partners analyze emerging trends to help security organizations plan and set priorities. Based on the DXC Security Trends for 2019, enterprises must guard against a wide range of threats and emerging operational technology risks,...

Read More

A Security Failure in the White House A SECURITY FAILURE IN THE WHITE HOUSE

blog article

Nov 01, 2019

At the time, ODNI predicted similar Russian efforts in the future. That prediction has come to pass: The FBI has reported Russian efforts against the 2020 elections. Nor are they the only ones taking aim at U.S. elections. Facebook recently found evidence of Iranian operations against the Trump camp...

Read More

Protect Your APIs PROTECT YOUR APIS

whitepaper

Nov 01, 2019

API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing ...

Read More

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath SMBS LACK RESOURCES TO DEFEND AGAINST CYBERATTACKS, PLUS PAY MORE IN THE AFTERMATH

blog article

Oct 31, 2019

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks much like the a...

Read More

Cybersecurity made simple: five steps SMEs can take to guard against attack CYBERSECURITY MADE SIMPLE: FIVE STEPS SMES CAN TAKE TO GUARD AGAINST ATTACK

blog article

Oct 31, 2019

Cybersecurity can be an intimidating subject for many small and medium businesses because the threats are so varied, from email fraud and ransomware infections to data breaches. But behind the technical descriptions of the types of risks, there are actually some simple, straightforward actions you c...

Read More

Mimecast: Tackling Cybersecurity in a connected economy MIMECAST: TACKLING CYBERSECURITY IN A CONNECTED ECONOMY

blog article

Oct 31, 2019

Mimecast, founded in 2003, is an international cyber resilience company, with offices in the UK, US, South Africa, Australia, Europe and the Middle East. Mimecast uses dispersed data centers, intelligent mail routing and robust cloud security to provide a security network capable of managing over 35...

Read More

Expert Advise On New ‘Unremovable’ xHelper Malware EXPERT ADVISE ON NEW ‘UNREMOVABLE’ XHELPER MALWARE

blog article

Oct 31, 2019

Over the past six months, the xHelper Android malware strain has made a name for itself after popping up on the radar of several antivirus companies, and annoying users thanks to a self-reinstall mechanism that has made it near impossible to remove. First spotted back in March but slowly expanded to...

Read More

Tips to Protect It: National Cybersecurity Awareness Month TIPS TO PROTECT IT: NATIONAL CYBERSECURITY AWARENESS MONTH

video

Oct 30, 2019

Held every October, National Cybersecurity Awareness Month is a collaborative effort between the government and the industry to raise awareness about the importance of cybersecurity and to provide the resources we need to be safer and more secure online. In our short video series, we'll be givin...

Read More

Insider Threats: A Problem That is Preventable INSIDER THREATS: A PROBLEM THAT IS PREVENTABLE

blog article

Oct 30, 2019

Earlier this summer, I read a fascinating story about McAfee launching a lawsuit against three former employees. The lawsuit alleged that these employees conspired to steal trade secrets on behalf of their new employer, accusing them of moving to a competitor and exfiltrating business-sensitive docu...

Read More

Say It Loud! I Didn’t Read the Privacy Policy and I’m Proud! SAY IT LOUD! I DIDN’T READ THE PRIVACY POLICY AND I’M PROUD!

blog article

Oct 29, 2019

We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. W...

Read More

Explainer: All you need to know about Joburg cyber attack EXPLAINER: ALL YOU NEED TO KNOW ABOUT JOBURG CYBER ATTACK

video

Oct 29, 2019

City Power warned customers on October 25 they could not report faults via the city's call centre due to a computer network security breach by a group seeking a bitcoin ransom. The city reported a breach of its network late on October 24 night and shut down its website e-services. Here's wha...

Read More

90 Seconds of Security: Malware Primer 90 SECONDS OF SECURITY: MALWARE PRIMER

video

Oct 29, 2019

A quick explanation of the different types of malware, how infections happen and what to do if you get infected. Courtesy of F5's Security Incident Response Team.

Read More

2019 Top Three Privacy Trends in US Lawmaking 2019 TOP THREE PRIVACY TRENDS IN US LAWMAKING

blog article

Oct 29, 2019

The original version of this blog, excluding NICE references, was initially published in Lydia de la Torre's Medium Blog. The version below has been extensively edited. The original version can be accessible here. The year 2019 began with a significant increase in bill introductions at the State...

Read More

What Do Hurricanes and Cybersecurity Have in Common? WHAT DO HURRICANES AND CYBERSECURITY HAVE IN COMMON?

blog article

Oct 29, 2019

With hurricanes intensifying, it’s not hard to imagine this scenario: it’s early October and the Weather Channel is extensively covering a hurricane that’s going to hit the East Coast of the United States in five days. Right now, it’s just a tropical storm somewhere near Cuba...

Read More

The Future of AI in Cybersecurity THE FUTURE OF AI IN CYBERSECURITY

blog article

Oct 29, 2019

The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed on products ranging from smartwatches to washing machines and of course every security tool on the market. Advertisements lead us to believe that if you couldn’t find a way t...

Read More

3 Reasons the Time is Right for Remote Reading 3 REASONS THE TIME IS RIGHT FOR REMOTE READING

whitepaper

Oct 29, 2019

Teleradiology and its enabling technologies were initially hailed simply for facilitating after-hours emergency consults and allowing radiologists to avoid overnight calls. Nearly three decades later, teleradiology is expected to be an $8.24 billion business by 2024, offering flexible work options f...

Read More

What’s behind your cyber security strategy? WHAT’S BEHIND YOUR CYBER SECURITY STRATEGY?

video

Oct 28, 2019

Trend Micro partnered with ITWeb Brainstorm in hosting another thought-provoking executive discussion on cyber security, the evolving risks and the new challenges.

Read More

2020 Cyber Security Trends You Should Be Aware Of 2020 CYBER SECURITY TRENDS YOU SHOULD BE AWARE OF

blog article

Oct 28, 2019

Cybersecurity is a fast-evolving game of wits where hackers and defenders continue to outmanoeuvre one another. Staying up to date with the latest trends in cybersecurity is not only beneficial; it’s imperative for everyone involved. Large-scale data breaches always make it to the headlines &n...

Read More

For cyber security, information security and data security DriveLock is your partner FOR CYBER SECURITY, INFORMATION SECURITY AND DATA SECURITY DRIVELOCK IS YOUR PARTNER

video

Oct 24, 2019

DriveLock SE, is headquartered in Munich, Germany with offices in Pleasanton, USA and Sydney, Australia and has become one of the leading Endpoint Protection Platform software vendors over the past 15 years.

Read More

What is cyber security? WHAT IS CYBER SECURITY?

blog article

Oct 24, 2019

Cyber security is the practice of reducing the risk of cyber attacks, which pose a threat to computers, servers, mobile phones, electronic systems and networks. Also known as Information Technology Security, or Electronic Information Security, it is broadly split into three ‘pillars’; pe...

Read More

Will AI Driven Cyber Security Help Stop Malicious Attacks? WILL AI DRIVEN CYBER SECURITY HELP STOP MALICIOUS ATTACKS?

blog article

Oct 24, 2019

In this era of modern technology, cyber-attacks occur in many cases and are predominant than ever before.  Artificial Intelligence in cyber security has been helping IT professionals to predict and block the cyber-attacks more effectively. AI has shaken the cybersecurity industry with its aston...

Read More

BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE

blog article

Oct 23, 2019

If you’re like me, one of the first things you do when you leave the house in the morning is put on your headset. I may be joining a meeting, calling a friend, getting coffee – sometimes all three – before I even set foot in the office. When I get to work, I’m collaborating w...

Read More

Four Key Strategies to Combat Ransomware FOUR KEY STRATEGIES TO COMBAT RANSOMWARE

blog article

Oct 23, 2019

The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact, and recommendations for recovery and continuity in the face of the growing threat. Our report reveals that 85% of MSPs surveyed report ransomware as the most common malware threat to sm...

Read More

How America HOW AMERICA'S CYBER STRATEGY COULD CREATE AN INTERNATIONAL CRISIS

blog article

Oct 23, 2019

The United States has adopted a new cyber warfare strategy focused on “persistent engagement” and “forward defense” in an attempt to thwart Chinese, Russian and other state-sponsored cyber attacks. While this unprecedented “defend forward” approach gives America m...

Read More

TENABLE IS A LEADER IN THE FORRESTER WAVE™Q4 2019 TENABLE IS A LEADER IN THE FORRESTER WAVE™Q4 2019

whitepaper

Oct 23, 2019

Tenable ranks highest in the strategy and current offering categories. “Tenable is a great choice for enterprises looking for a VRM vendor that provides strong prioritization and reporting across device types,” according to a Forrester report. We believe this report reinforces Tenable’s Cyber Exposu...

Read More

POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS

blog article

Oct 22, 2019

It seems like every photo shown of a business in action these days features a bunch of people in a huddle room, looking productive – just like our own Poly beauty shot below. But the technology that is IN the room really matters most to the people who are joining remotely – the people NO...

Read More

Avast target of cyber-security attack, company and Czech counterintelligence say AVAST TARGET OF CYBER-SECURITY ATTACK, COMPANY AND CZECH COUNTERINTELLIGENCE SAY

blog article

Oct 22, 2019

Czech-based Avast and Czech counterintelligence service BIS said on Monday they had detected a network attack on the cyber-security company which the BIS suspected of originating in China. Avast said in a blog post that it found suspicious behaviour on its network on Sept. 23 and opened an investiga...

Read More

Cybersecurity: a crucial issue for industry and transport stakeholders CYBERSECURITY: A CRUCIAL ISSUE FOR INDUSTRY AND TRANSPORT STAKEHOLDERS

blog article

Oct 21, 2019

Cybersecurity is defined as all the technical and non-technical measures of protection that enable an information system to withstand events liable to compromise the availability, integrity, confidentiality or associated proofs (identity, authenticity, traceability) of data stored, processed or tran...

Read More

Scott Schober discusses the state of cybersecurity SCOTT SCHOBER DISCUSSES THE STATE OF CYBERSECURITY

video

Oct 21, 2019

CGTN's Elaine Reyes spoke with Scott Schober, president and CEO of Berkeley Varitronics Systems, discusses U.S. cybersecurity in America, China and around the world, vulnerabilities and its future.

Read More

Former Twitter CISO on IT security hiring and cybersecurity FORMER TWITTER CISO ON IT SECURITY HIRING AND CYBERSECURITY

video

Oct 20, 2019

Michael Coates, CEO and co-founder of Altitude Networks and the former CISO at Twitter, shares best practices for building strong security teams and for starting a career in cybersecurity.

Read More

Alaska Communications Cyber Security Infographic ALASKA COMMUNICATIONS CYBER SECURITY INFOGRAPHIC

infographic

Oct 18, 2019

With cyber criminals becoming more sophisticated than ever, cyber crime remains a serious threat facing businesses of all sizes. Seventy-seven percent of businesses have been victimized by one or more cyber attacks in 2018. Find out what businesses are doing to combat cyber attacks in today’s ...

Read More

Security by Sector: Cyber-Criminals Seek to Exploit Automotive Manufacturing SECURITY BY SECTOR: CYBER-CRIMINALS SEEK TO EXPLOIT AUTOMOTIVE MANUFACTURING

blog article

Oct 18, 2019

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r...

Read More

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software MICROSOFT TO REWARD HACKERS FOR FINDING BUGS IN OPEN SOURCE ELECTION SOFTWARE

blog article

Oct 18, 2019

Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide. Whether it's American voting machines during the 2016 presidential election or India's EVMs during 2014 general elections, the integrity, transparency, and security of electr...

Read More

The Identity Challenge: How Can Banks Know Who’s Who? THE IDENTITY CHALLENGE: HOW CAN BANKS KNOW WHO’S WHO?

blog article

Oct 17, 2019

Technology has transformed the world of banking, bringing all manner of new services to the table and revolutionising the way that customers manage their finances. Gone are the days of fixed branches and localised appointments. Today’s banking is done with the click of a button. However, techn...

Read More

US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns US DOD COMMENTS ON HUAWEI, HIKVISION, DAHUA CYBER SECURITY CONCERNS

video

Oct 16, 2019

Can you talk a little bit about the Department of Defense's concerns about cybersecurity as it relates to the PRC? Last year in the NDAA there was a ban for Huawei, Hikvision, and Dahua. So is the Department of Defense concerned about companies and organizations that might have influence by the ...

Read More

Cryptojacking worm infects exposed Docker deployments CRYPTOJACKING WORM INFECTS EXPOSED DOCKER DEPLOYMENTS

blog article

Oct 16, 2019

Attackers are exploiting Docker Engine deployments that are exposed to the internet without authentication to deploy and run cryptojacking malware on servers. A new cryptojacking botnet with self-spreading capabilities has infected over 2,000 such Docker deployments so far. There have been incidents...

Read More

Cyber-attacks – are you at risk? CYBER-ATTACKS – ARE YOU AT RISK?

video

Oct 16, 2019

Crombie Lockwood Cyber Practice Leader Elizabeth Harbison talks about the emerging risk of cyber-attacks to New Zealand small businesses.

Read More

Maritime Meets Cyber Security MARITIME MEETS CYBER SECURITY

blog article

Oct 16, 2019

As of October 2019, to the best of my knowledge, there has not been a single, dedicated hacking attack against a vessel at sea by malicious actors. While there have been rumors  specifically one from an American telco provider in 2016 that hackers have teamed up with pirates to track high value...

Read More

Critical Success Factors for ABM: Thinking Differently About Data and Reporting CRITICAL SUCCESS FACTORS FOR ABM: THINKING DIFFERENTLY ABOUT DATA AND REPORTING

infographic

Oct 16, 2019

Succeeding with ABM includes taking a broader, more end-to-end approach to measurement. What’s more, successful ABMers move beyond core systems for their planning, executing and reporting. This infographic shows the importance of looking beyond standard reporting methods, adding lead scoring t...

Read More

What’s the answer to the vulnerability overload problem? Key findings from ESG’s Cyber Risk Management survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Oct 16, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do you know...

Read More

3 Things You Need to Know About Prioritizing Vulnerabilities 3 THINGS YOU NEED TO KNOW ABOUT PRIORITIZING VULNERABILITIES

whitepaper

Oct 16, 2019

With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: Discover the 3 critical steps to buil...

Read More

Cyber Security Stats For Mid-Year 2019 Infographic CYBER SECURITY STATS FOR MID-YEAR 2019 INFOGRAPHIC

infographic

Oct 15, 2019

Cyber Security Hub recently fielded an email survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year. This mid-year checkpoint was a follow-up to the previously fielded survey that took place in November 2018.

Read More

A Look at Deception A LOOK AT DECEPTION

whitepaper

Oct 15, 2019

By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoin...

Read More

FIN7 Gang Returns With New Malicious Tools: Researchers FIN7 GANG RETURNS WITH NEW MALICIOUS TOOLS: RESEARCHERS

blog article

Oct 15, 2019

Despite a major law enforcement crackdown on some of its members in 2018, the FIN7 financial hacking gang has returned with new malicious tools, including a revamped dropper and payload, as part of a new campaign, according to a recent analysis from FireEye. For several years, FIN7 hackers targeted ...

Read More

The top ten password-cracking techniques used by hackers THE TOP TEN PASSWORD-CRACKING TECHNIQUES USED BY HACKERS

blog article

Oct 14, 2019

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you. You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay ...

Read More

What is cybersecurity? WHAT IS CYBERSECURITY?

blog article

Oct 13, 2019

Cybersecurity, or computer security, is the protection of computer systems from the theft or damage to their hardware, software, of electric data, as well as form the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance to computer s...

Read More

Cyber Report: What Is Cyber Security? CYBER REPORT: WHAT IS CYBER SECURITY?

video

Oct 12, 2019

October is National Cyber Security Awareness Month and on this first episode of the Cyber Report, sponsored by Northrop Grumman Cyber & Intelligence Mission Solutions, Matt Jorgenson talks to Defense & Aerospace Report Editor Vago Muradian about what cyber security is and why it matters.

Read More

The C-Suite and Cybersecurity THE C-SUITE AND CYBERSECURITY

video

Oct 11, 2019

Attendees at this year’s WSJ Pro Cybersecurity Executive Summit in London gathered to discuss hot-button issues for cybersecurity. This video looks at how the responsibilities of the C-suite have evolved in response to the increasing importance of cybersecurity.

Read More

Mobile Cybersecurity Tips from Emery Csulak, DOE Chief Information Security Officer MOBILE CYBERSECURITY TIPS FROM EMERY CSULAK, DOE CHIEF INFORMATION SECURITY OFFICER

video

Oct 11, 2019

Our heavy reliance on mobile devices to communicate means we must make mobile cybersecurity a top priority both at home and at work! Learn how DOE is prioritizing mobile cybersecurity by providing tips to stay safe and secure.

Read More

Defense in Depth: User-Centric Security DEFENSE IN DEPTH: USER-CENTRIC SECURITY

blog article

Oct 10, 2019

It’s impossible to create a security system that removes the user from the equation. They are integral and they have to be part of your security program. Security is defined by the individual. The minimum expectation you can have of your users is that they’ll operate in good faith. Avoid...

Read More

McAleenan speaks at cybersecurity event MCALEENAN SPEAKS AT CYBERSECURITY EVENT

video

Oct 10, 2019

FOX News operates the FOX News Channel (FNC), FOX Business Network (FBN), FOX News Radio, FOX News Headlines 24/7, FOXNews.com and the direct-to-consumer streaming service, FOX Nation. FOX News also produces FOX News Sunday on FOX Broadcasting Company and FOX News Edge.

Read More

Hacking Is Not a Crime! Additional Thoughts from DEFCON 2019 HACKING IS NOT A CRIME! ADDITIONAL THOUGHTS FROM DEFCON 2019

blog article

Oct 10, 2019

In my previous post, I spoke about all of the different DEFCON villages where attendees can learn about and purchase all sorts of fun hacking/counter hacking tools. Even so, I covered only a small fraction of the activities at the conference. For example, attendees have the opportunity to participat...

Read More

Cyber-Sicherheit in der Gebaudeautomation (GA) CYBER-SICHERHEIT IN DER GEBAUDEAUTOMATION (GA)

whitepaper

Oct 10, 2019

Die Gebäude, in denen wir leben und arbeiten, werden intelligenter und stärker vernetzt. Aktuell werden die Szenen Realität, die wir bisher nur aus Science-Fiction-Filmen kennen: Durch die steigende Anzahl an IoT-Geräten verwandeln sich unsere Wohnungen und Büros in „intelligente Gebäude”, die selbs...

Read More

Optimale Sicherheit fur ICS-Netzwerke OPTIMALE SICHERHEIT FUR ICS-NETZWERKE

whitepaper

Oct 10, 2019

Unternehmen sind meist nicht mehr konkurrenzfähig, wenn sie Informationstechnologie (IT) und operative Technologien (OT) getrennt betreiben. Aber sie näher zusammenzubringen, führt zu enormer Komplexität bei der eingesetzten Technik. Betriebstechnikleiter waren bisher mit einer steigenden Flut von H...

Read More

The ROI of Retaining Sales Reps THE ROI OF RETAINING SALES REPS

infographic

Oct 10, 2019

The greatest investment your company can make is in its people—specifically sales reps. Unfortunately, most organizations don't see the real impact of their top performers until they leave—and the cost to replace them is often high. This is why, to retaining high-performing sales rep...

Read More

What cyber security training does Falanx Cyber offer? WHAT CYBER SECURITY TRAINING DOES FALANX CYBER OFFER?

video

Oct 09, 2019

Head of security awareness and ethical hacker, Rob Shapland, on what security awareness training services Falanx Cyber offer customers.

Read More

Cybersecurity for Financial Institutions CYBERSECURITY FOR FINANCIAL INSTITUTIONS

video

Oct 09, 2019

As a bank or financial institution, you work with sensitive data every day. You likely have  extensive files with account information, FEIN numbers, financial reports, and more. If you get hacked, each and every one of your customers could be affected. This is an easy way to lose the trust you&...

Read More

Unmask cybercriminals through identity attribution UNMASK CYBERCRIMINALS THROUGH IDENTITY ATTRIBUTION

blog article

Oct 08, 2019

Organized crime has grown more complex since the turn of the century—coinciding with the rise of the digital world, cybercriminals have leveraged the proliferation of technology to broaden their reach with a more sophisticated network-structured model, effectively globalizing their operations ...

Read More

How to Get Involved in Cybersecurity with Lidia Giuliano HOW TO GET INVOLVED IN CYBERSECURITY WITH LIDIA GIULIANO

video

Oct 08, 2019

Lidia Giuliano, Principle Security Consultant at Pulcino Security, shares how she built her career in cybersecurity, how she stays involved, and her biggest piece of advice for those looking to get started in the industry.

Read More

Is Your Enterprise Cyber Risk Managed Well? IS YOUR ENTERPRISE CYBER RISK MANAGED WELL?

blog article

Oct 07, 2019

In this article I want to share with you the secrets to being able to assess whether the enterprise cyber risk in your organization is being managed effectively using a simple set of questions. These are questions that will work even if you are not working in the security function – and I thin...

Read More

How Cloud Computing is Changing Cybersecurity HOW CLOUD COMPUTING IS CHANGING CYBERSECURITY

blog article

Oct 07, 2019

As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do amazing things with web-delivered technologies. However, one of the biggest issues around the cloud has always been, and still is, cybersecurity. (Read The Truth About Cybersecurity.)The clou...

Read More

What every CEO needs to know about Cybersecurity WHAT EVERY CEO NEEDS TO KNOW ABOUT CYBERSECURITY

video

Oct 05, 2019

Mathew Moynahan, CEO of Forcepoint explains what every CEO needs to know about cybersecurity. According to him, external protection isn't enough and it is paramount to empower teams to fight threats. EMIR is the Middle East's most influential corporate intelligence network for CEOs and gover...

Read More

ZTE Cybersecurity White Paper ZTE CYBERSECURITY WHITE PAPER

whitepaper

Oct 04, 2019

The 5G era has been started. Technologies like cloud computing, the Internet of Things (IoT), big data, and AI are gradually booming in the market. These new technologies bring about a new industry revolution together with significant cybersecurity concerns.

Read More

Infographic: Manage Banking Consumers INFOGRAPHIC: MANAGE BANKING CONSUMERS' TOP CYBERSECURITY FEARS

infographic

Oct 04, 2019

CSI and Harris Poll recently surveyed 2,000 Americans nationwide about their opinions and fears surrounding cybersecurity as it pertains to their personal financial data.

Read More

European Cyber Security Month EUROPEAN CYBER SECURITY MONTH

infographic

Oct 04, 2019

A device’s default password is incredibly easy to bypass. It’s basically an open door to your device and all your activity and data. Creating your own personal password is easy and gives you control over what information comes in and goes out.

Read More

I.T. Security Isn’t Just More Important Than Ever It’s The Most Important Thing, Period I.T. SECURITY ISN’T JUST MORE IMPORTANT THAN EVER IT’S THE MOST IMPORTANT THING, PERIOD

whitepaper

Oct 04, 2019

Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield powered by Intel® vPro™ Platform is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays sec...

Read More

4 Steps to Increasing Event ROI with Intent Data 4 STEPS TO INCREASING EVENT ROI WITH INTENT DATA

blog article

Oct 02, 2019

There’s no denying how valuable event marketing can be for any B2B business. Studies have shown that 84% of B2B leaders believe events are critical components of business success. But not all event marketing strategies are created equal. Without the right strategy, events can quickly become a ...

Read More

6 Practical Steps to Build, Execute and Scale Smarter ABM 6 PRACTICAL STEPS TO BUILD, EXECUTE AND SCALE SMARTER ABM

blog article

Oct 02, 2019

It’s hard to argue against the promises of account-based marketing (ABM). Focusing your marketing efforts on ideal accounts that are actively in the market for your products and services seems like a recipe for success in any industry. But the truth is that many ABM programs fail to achieve me...

Read More

Ninth Annual Cost of Cybercrime Study NINTH ANNUAL COST OF CYBERCRIME STUDY

infographic

Oct 02, 2019

The Ninth Annual Cost of Cybercrime study combines research across 11 countries in 16 industries. We interviewed 2,647 senior leaders from 355 companies and drew on the experience and expertise of Accenture Security to examine the economic impact of cyberattacks.

Read More

31 DAYS OF ONLINE SECURITY TIPS 31 DAYS OF ONLINE SECURITY TIPS

infographic

Oct 02, 2019

We’ve written a few articles recently about cybersecurity because we feel this area is often neglected by otherwise security-conscious individuals. Even if you’re not a tech expert who spends most of the day working with computers, the internet has become an inseparable part of our daily...

Read More

Build your career with our Cybersecurity and Technology Risk team BUILD YOUR CAREER WITH OUR CYBERSECURITY AND TECHNOLOGY RISK TEAM

video

Oct 02, 2019

Are you searching for a career in Cybersecurity? GE Aviation is hiring! Our Cybersecurity and Technology Risk team is actively searching for talent to add to our growing team and help protect GE Aviation’s critical assets. Watch here as Senior Executive of Risk & Compliance, Deneen DeFiore...

Read More

Benefits of Using a Managed Services Provider for Cybersecurity BENEFITS OF USING A MANAGED SERVICES PROVIDER FOR CYBERSECURITY

video

Oct 02, 2019

When you talk to business leaders and owners of all sizes there appears to be one key business concern and challenge  cybersecurity and compliance. Threats are arising inside and outside a company’s network, across all industries, making businesses more aware of their exposure to hacking ...

Read More

Prescriptive security for Financial Services PRESCRIPTIVE SECURITY FOR FINANCIAL SERVICES

whitepaper

Oct 01, 2019

This document should be read in conjunction with the Atos publication “Prescriptive Security for Financial Services – Solution Brief” which discusses the commercial drivers for the adoption of prescriptive security services and the professional and IT service options available to f...

Read More

Psap threat modeling white paper PSAP THREAT MODELING WHITE PAPER

whitepaper

Oct 01, 2019

Next Generation 9-1-1 (NG9-1-1) has reshaped the way Public Safety Answering Points (PSAPs) serve their community by providing communication that’s more accurate, integrated and tailor-made for today’s digital and wireless lifestyles. But with these technological advances, NG9-1-1 also i...

Read More

Twilio Whitepaper Security Architecture TWILIO WHITEPAPER SECURITY ARCHITECTURE

whitepaper

Oct 01, 2019

While security is a high priority for all teams, a dedicated Security Team manages Twilio’s security program. The Twilio security framework is based on the ISO 27001 Information Security Standard and includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryp...

Read More

Cyber Security Awareness Month starts today CYBER SECURITY AWARENESS MONTH STARTS TODAY

blog article

Oct 01, 2019

For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year Halloween. However, it’s time not only to prepare for all things spooky. Far from it October is also a month dedicated to a subject that, if ig...

Read More

McAfee Labs 2019 Threats Predictions MCAFEE LABS 2019 THREATS PREDICTIONS

infographic

Sep 30, 2019

Cybercriminals can buy malware, exploits, botnets, and other shady services on the underground market. Criminals of varying experience and sophistication can easily launch attacks. brands will propel more sophisticated cryptocurrency mining and increases in mobile malware and stolen credit cards and...

Read More

Cyber Security and Manufacturing A Briefing for Manufacturers CYBER SECURITY AND MANUFACTURING A BRIEFING FOR MANUFACTURERS

whitepaper

Sep 30, 2019

Manufacturing is a significant target for cyber-criminals. This can result in the theft of sensitive data, industrial espionage for competitive advantage, or the disruption of access to systems or operational technology. 60% of our members tell us they have at some time been subject to a cyber secur...

Read More

Australia’s 2020 Cyber Security Strategy AUSTRALIA’S 2020 CYBER SECURITY STRATEGY

whitepaper

Sep 30, 2019

The internet is an essential part of life for many Australians. We use it to work, stay in touch, access entertainment, pay the bills and manage our finances. At the same time, more of the things around us are connecting online, including our cars, household appliances and industrial machinery. The ...

Read More

New U.N. Debate on Cybersecurity in the Context of International Security NEW U.N. DEBATE ON CYBERSECURITY IN THE CONTEXT OF INTERNATIONAL SECURITY

blog article

Sep 30, 2019

In 2018, the United Nations General Assembly voted to establish two separate groups to study international law and norms in relation to cyberspace. Resolution 73/27—proposed by a number of countries, including Russia—created an open-ended working group (OEWG) on the subject. Another grou...

Read More

Cylance is golden: BlackBerry’s new cybersecurity R&D lab is all about AI and IoT CYLANCE IS GOLDEN: BLACKBERRY’S NEW CYBERSECURITY R&D LAB IS ALL ABOUT AI AND IOT

blog article

Sep 30, 2019

BlackBerry has announced a new business unit dedicated entirely to cybersecurity research and development (R&D).The BlackBerry Advanced Technology Development Labs (BlackBerry Labs) will “operate at the forefront” of cybersecurity R&D, according to BlackBerry. The unit will be sp...

Read More

Digital transformation and cybersecurity (RGB) DIGITAL TRANSFORMATION AND CYBERSECURITY (RGB)

infographic

Sep 29, 2019

As companies embrace technologies such as the Internet of Things, big data, cloud, and mobility, security must be more than an afterthought. But in the digital era, the focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud.

Read More

Microsoft Talks Cyber Security Readiness with Circadence MICROSOFT TALKS CYBER SECURITY READINESS WITH CIRCADENCE

video

Sep 27, 2019

Microsoft's Mark McIntyre interviews Circadence's Keenan Skelly, VP of Global Partnerships and Security Evangelist, on the widening cyber skills gap and how companies can and should shift to a persistent cyber learning and training strategy that prioritizes skill building and cyber competenc...

Read More

Ransomware: Four ways to protect data now RANSOMWARE: FOUR WAYS TO PROTECT DATA NOW

whitepaper

Sep 27, 2019

As the threat of ransomware continues to grow, Citrix provides solutions and best practices to help prevent breaches and to ensure that data remains available in the event that an attack does occur. This white paper explains 4 ways Citrix solutions help kidnap-proof your data: Shield users of web ap...

Read More

Deliver unparalleled remote access with Citrix Workspace DELIVER UNPARALLELED REMOTE ACCESS WITH CITRIX WORKSPACE

whitepaper

Sep 27, 2019

As companies scale, they add solutions leaving employees having with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connec...

Read More

EMA report and buyer’s guide: 10 priorities for enabling secure access to enterprise IT services EMA REPORT AND BUYER’S GUIDE: 10 PRIORITIES FOR ENABLING SECURE ACCESS TO ENTERPRISE IT SERVICES

whitepaper

Sep 27, 2019

For an organization to enable productivity, drive profitability, and meet business objectives, it must make it easy for employees to securely access the IT services they need to get their job done. Trends like mobility and the cloud have complicated matters, but with the right priorities, IT can suc...

Read More

ESG report: Ensuring Business-Centric Device Visibility Across the Extended Enterprise ESG REPORT: ENSURING BUSINESS-CENTRIC DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE

whitepaper

Sep 27, 2019

Digital transformation (DX) priorities support of a variety of business initiatives that can drive business decisions and innovation. Yet many firms struggle to discover, assess and control the devices that enable DX. In this ESG Solution Showcase, Jon Oltsik, senior principal analyst of the Enterpr...

Read More

From Overload to Overlord: Reduce Risks and Take Control of Your ICS Network FROM OVERLOAD TO OVERLORD: REDUCE RISKS AND TAKE CONTROL OF YOUR ICS NETWORK

whitepaper

Sep 27, 2019

Official: organizations can no longer compete effectively while keeping Information Technology (IT) and Operational Technology (OT) separate. Although IT-OT converged ICS networks deliver many business benefits, they also challenge OT managers with new complexities, including the rise of cyber and o...

Read More

5 Network Security Challenges That Have IT Banging Their Head Against A Wall 5 NETWORK SECURITY CHALLENGES THAT HAVE IT BANGING THEIR HEAD AGAINST A WALL

whitepaper

Sep 27, 2019

To say IT professionals, have “challenging” careers would be a vast understatement. Network security specialists today feel like they’re fighting a perpetual battle. In many cases they are understaffed, undertrained and lack support to do the job they are being asked to do. It doesn’t have to be all...

Read More

Protect the Network from the Endpoint with the Critical Security Controls PROTECT THE NETWORK FROM THE ENDPOINT WITH THE CRITICAL SECURITY CONTROLS

whitepaper

Sep 27, 2019

According to the SANS State of Endpoint Security Survey, the endpoint is rapidly evolving and often the first vector of attack into enterprises. It’s no surprise, then, that endpoint security and control are becoming major focal points of SANS security. This whitepaper discusses four Critical Securi...

Read More

SANS: Industrial IoT Security Survey SANS: INDUSTRIAL IOT SECURITY SURVEY

whitepaper

Sep 27, 2019

Everyone who is responsible for Industrial Internet of Things (IIoT) security is working in uncharted territory as there are currently no models or standards that provide adequate guidance for segmenting and safeguarding contemporary systems. And there’s nothing out there that accounts for the borde...

Read More

Implementing the FAIR Model IMPLEMENTING THE FAIR MODEL

whitepaper

Sep 27, 2019

Reporting on cyber risk has become a top priority for the Board of Directors of most large enterprises. Calculating a meaningful risk score and building an effective risk mitigation strategy can be challenging. Can science improve the way we view and quantify cyber risk? Absolutely. The FAIR methodo...

Read More

5 Network Security Challenges That Have IT Banging Their Head Against A Wall 5 NETWORK SECURITY CHALLENGES THAT HAVE IT BANGING THEIR HEAD AGAINST A WALL

whitepaper

Sep 27, 2019

To say IT professionals, have “challenging” careers would be a vast understatement. Network security specialists today feel like they’re fighting a perpetual battle. In many cases they are understaffed, undertrained and lack support to do the job they are being asked to do. It doesn’t have to be all...

Read More

Continuous Visibility, Assessment and CARTA CONTINUOUS VISIBILITY, ASSESSMENT AND CARTA

whitepaper

Sep 27, 2019

Digital transformation represents real progress when it comes to improving business processes of all kinds. However, it has also broadened the environment for advanced threats and opened new opportunities for exploitation. This paper describes how the Forescout visibility platform, with its continuo...

Read More

Assembling cybersecurity: The politics and
materiality of technical malware reports and the case
of Stuxnet ASSEMBLING CYBERSECURITY: THE POLITICS AND MATERIALITY OF TECHNICAL MALWARE REPORTS AND THE CASE OF STUXNET

whitepaper

Sep 26, 2019

This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success...

Read More

ATM & Cyber Security 2019 ATM & CYBER SECURITY 2019

video

Sep 26, 2019

ATM Safe is exhibiting at the ATM & Cyber Security 2019. Our security team welcome all ATM and banking security experts to visit us at booth 9. Visit the world’s leading conference at the Park Plaza Victoria Hotel, London on 8th-9th October 2019.

Read More

 The Power of Peers: A Framework to Promote Social Learning at Work Case Examples by Slack and Udemy THE POWER OF PEERS: A FRAMEWORK TO PROMOTE SOCIAL LEARNING AT WORK CASE EXAMPLES BY SLACK AND UDEMY

whitepaper

Sep 26, 2019

While informal peer-to-peer learning is known to drive 70% of learning at work, how can L&D leaders facilitate this social learning in a more structured way? Download the ebook to walk away with: A 3-stage approach and framework to help you design effective social learning programs at your organizat...

Read More

An Introduction to Data-driven Sales Planning AN INTRODUCTION TO DATA-DRIVEN SALES PLANNING

blog article

Sep 25, 2019

Most organizations still conduct sales planning as a manual, once-per-year exercise, due to the painful and time-consuming nature of the process. Since this is traditionally viewed as a burdensome task, it’s common that once sales plans are set in motion, companies rarely go back to evaluate a...

Read More

The Top B2B Influencer Marketing Trends for 2020 THE TOP B2B INFLUENCER MARKETING TRENDS FOR 2020

infographic

Sep 25, 2019

While there are some who think the expression “influencer” is an expired term, the role of influence on B2B buying decisions is irrefutable. According to the World Federation of Advertisers, 65% of multinational brands will increase their influencer marketing spending within the next 12 ...

Read More

Military Cyber Security: Danish Parliamentary Hearing MILITARY CYBER SECURITY: DANISH PARLIAMENTARY HEARING

video

Sep 25, 2019

On 11 September 2019, the Defence Committee of the Danish Parliament hosted a public hearing on the military aspects of cyber security to help launch my book, Understanding Cybersecurity.

Read More

Cybercrooks Target U.S. Veterans with Fake Hiring Website CYBERCROOKS TARGET U.S. VETERANS WITH FAKE HIRING WEBSITE

blog article

Sep 25, 2019

Researchers are warning that a fake website – purporting to help U.S. military veterans search for jobs  actually links to installers that download malware onto victims’ systems. The website spoofs a legitimate website for U.S. military veterans offered by the U.S. Chamber of Commer...

Read More

The Forrester Wave™: Digital Asset Management for Customer Experience, Q4 2019 THE FORRESTER WAVE™: DIGITAL ASSET MANAGEMENT FOR CUSTOMER EXPERIENCE, Q4 2019

whitepaper

Sep 24, 2019

Forrester Research, Inc. evaluated Aprimo among the 14 most significant DAM providers based on 28 criteria. Aprimo received the highest scores possible in 20 criteria, including Metadata & Taxonomy, Workflow & Approvals, Content Performance Analytics, Scalability, and Product Vision.

Read More

Wait… What? Good News in Cybersecurity? WAIT… WHAT? GOOD NEWS IN CYBERSECURITY?

blog article

Sep 24, 2019

We simply don’t hear enough good news cybersecurity stories that make those involved proud. What are the cybersecurity stories that aren’t being told publicly that should be? Michael Farnum, Set Solutions, said, “If you come into the job and aren’t willing to critically revie...

Read More

The Good for Texas Cybersecurity Tour: Andrew Rodriguez THE GOOD FOR TEXAS CYBERSECURITY TOUR: ANDREW RODRIGUEZ

video

Sep 24, 2019

Student Andrew Rodriguez describes how closely the cybersecurity program at UTSA has aligned with his experience as an intern at our agency. See how higher education programs in Texas are responding to the need for a cybersecurity workforce in Texas.

Read More

Encryption Backdoors What it Means for Machines and Cybersecurity ENCRYPTION BACKDOORS WHAT IT MEANS FOR MACHINES AND CYBERSECURITY

video

Sep 24, 2019

The biggest debate in cybersecurity today - should governments implement encryption backdoors? Venafi's CEO Jeff Hudson explains what this would mean for the security of some of our safest tech - from self-driving cars to nuclear reactors, and all machines that are on the internet. Venafi - inve...

Read More

Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme MALICIOUS AD BLOCKERS FOR CHROME CAUGHT IN AD FRAUD SCHEME

blog article

Sep 24, 2019

‘AdBlock’ and ‘uBlock’ impersonate legitimate extensions but instead engage in cookie stuffing to defraud affiliate marketing programs, a researcher has found. Google has removed two malicious ad blockers from its Chrome Web Store after a researcher discovered they were carry...

Read More

4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION 4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION

blog article

Sep 23, 2019

It is exciting to see how forensics contributes to the investigation of a cyberattack. The application of forensics in the crime scene is what we are aware of but using forensics in digital crime requires a deeper understanding. One common aspect among both is that the evidence must be secured and h...

Read More

Speed Up Your Digital Transformation With The Cloud SPEED UP YOUR DIGITAL TRANSFORMATION WITH THE CLOUD

whitepaper

Sep 23, 2019

In this Content Services in the Cloud Guide by AIIM, we explore how companies are tackling critical document and content management processes such as Accounts Payable, Contract Management and HR Onboarding with the challenges of: Sharing documents securely Automating time-consuming processes Ditchin...

Read More

Cyber Security Stats For Mid-Year 2019 CYBER SECURITY STATS FOR MID-YEAR 2019

infographic

Sep 20, 2019

Cyber Security Hub recently fielded an email survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year. This mid-year checkpoint was a follow-up to the previously fielded survey that took place in November 2018.

Read More

Successful Approaches to Using Intent Data – Practical Tips from Priority Engine Users SUCCESSFUL APPROACHES TO USING INTENT DATA – PRACTICAL TIPS FROM PRIORITY ENGINE USERS

blog article

Sep 20, 2019

Increasing sales adoption of Priority Engine, incorporating its data into other systems, and measuring its success are a few key areas in which Priority Engine users commonly seek advice. We recently met with a variety of Priority Engine users and gathered their experiences tackling these common cha...

Read More

The Cyber Risk to Food Processing and Manufacturing THE CYBER RISK TO FOOD PROCESSING AND MANUFACTURING

whitepaper

Sep 20, 2019

Almost every week brings news of a new cybersecurity incident. These typically effect companies
and organizations in the financial, retail, or healthcare industries or, more recently, state and local
governments. They also usually involve data breaches or other attacks that affect info...

Read More

The Cybersecurity Blueprint THE CYBERSECURITY BLUEPRINT

whitepaper

Sep 20, 2019

Cybercrime has grown costlier over the past few years. Ponemon Institute found the average cost of a data breach for businesses was $3.86 million USD per incident1 . Security incidents also affect a large portion of businesses. A study from Thales Security found 70% of their respondents in the Unite...

Read More

Preparing For Physical and Cybersecurity Convergence PREPARING FOR PHYSICAL AND CYBERSECURITY CONVERGENCE

blog article

Sep 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private se...

Read More

What level of AI is right for your DAM? WHAT LEVEL OF AI IS RIGHT FOR YOUR DAM?

blog article

Sep 19, 2019

When you read about the artificial intelligence (AI) capabilities today’s DAM vendors offer, you’ll be faced with a myriad of choices. You’ll find everything from claims of automated, out-of-the-box AI to the ability to ‘train your own AI.’ To help make sense of these c...

Read More

10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ 10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ

blog article

Sep 19, 2019

GCHQ, the Government Communications Headquarters is an intelligence and security agency responsible for keeping the U.K. safe. The team of GCHQ uses cutting-edge technology, technical ingenuity, and wide-ranging partnerships to identify, analyze, and disrupt threats. GCHQ deals with real threats tha...

Read More

5 Tips and Tricks to Boost Small Business Security 5 TIPS AND TRICKS TO BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers.  Many small business owners think they're safe from hackers. After a...

Read More

Protect your information with these cyber security tips PROTECT YOUR INFORMATION WITH THESE CYBER SECURITY TIPS

video

Sep 19, 2019

Miller Insurance Group, Inc. is an independent insurance agent offering Spruce Pine, North Carolina and surrounding areas auto insurance, home insurance, life insurance, and business insurance.

Read More

5 Tips & Tricks That Boost Small Business Security 5 TIPS & TRICKS THAT BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Keep your small business safe from hackers using these cybersecurity tips. Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Ma...

Read More

Cybersecurity for Distributed Energy Resources and SCADA Systems CYBERSECURITY FOR DISTRIBUTED ENERGY RESOURCES AND SCADA SYSTEMS

blog article

Sep 19, 2019

As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability coordinators to maintain a secure supply will be increasingly challenged. This document reviews the v...

Read More

Practical Approaches to High-ROI ABM: Introduction PRACTICAL APPROACHES TO HIGH-ROI ABM: INTRODUCTION

video

Sep 18, 2019

Despite a lot of hype around ABM in the B2B tech sector, some marketers are reluctant to launch ABM programs out of a concern that it’s just too difficult. In this short video, Executive Vice President Bill Crowley recommends a more practical approach: TechTarget’s ABM and purchase inten...

Read More

Spreadsheets vs. Automation: What's Best for Sales Compensation Management? SPREADSHEETS VS. AUTOMATION: WHAT'S BEST FOR SALES COMPENSATION MANAGEMENT?

blog article

Sep 18, 2019

Spreadsheets are the most common tool used to manage data in sales organizations. In fact, more than 75% of companies rely on spreadsheets for their sales planning, forecasting, and sales compensation management. However, the business landscape is growing increasingly competitive—can tradition...

Read More

The 1 Overlooked Loophole In Cyber Security THE 1 OVERLOOKED LOOPHOLE IN CYBER SECURITY

video

Sep 18, 2019

There's an often overlooked cyber security loophole that exists for a lot of your clients. Discover how to get paid to close it now.

Read More

Employee Shortages & Skill Gaps In Cybersecurity EMPLOYEE SHORTAGES & SKILL GAPS IN CYBERSECURITY

video

Sep 18, 2019

In the 2nd part with CEO & founder of STASH Secure Data, Janine Darling, we discuss the current shortages of people within the industry and how skill gaps could provide reasoning for this.

Read More

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond HOW AI CAN CHAMPION CYBERSECURITY IN THE INSURANCE INDUSTRY AND BEYOND

blog article

Sep 18, 2019

Over the last decade, the cybersecurity environment has undergone significant changes. But while the Internet may be vast, it isn’t necessarily becoming safer. Major data leaks from high profile companies like Equifax set a clear message that even big players are vulnerable to security breache...

Read More

AI in cyber security: a necessity or too early to introduce? AI IN CYBER SECURITY: A NECESSITY OR TOO EARLY TO INTRODUCE?

blog article

Sep 18, 2019

There is a list of growing cyber security threats, ranging from a rise in identity thefts and account takeovers to vindictive ransomware strains. Businesses are feeling the strain, especially Fortune 500 enterprises, who have massive stores of data. Because of this, they have become attractive to ba...

Read More

SAP S/4HANA 1809 Product Launch Video with Bert Schulze SAP S/4HANA 1809 PRODUCT LAUNCH VIDEO WITH BERT SCHULZE

video

Sep 18, 2019

Bert Schulze, VP SAP S/4HANA Product Management & Co-Innovation, SAP SE, introduces SAP S/4HANA 1809. In his video, he explains how intelligence is achieved in the latest release, which tools can be used, and the benefits users can take advantage of when using SAP S/4HANA 1809.

Read More

SAP Festival 2019: Innovation Talk by Tom Raftery - People, Planet and Profits SAP FESTIVAL 2019: INNOVATION TALK BY TOM RAFTERY - PEOPLE, PLANET AND PROFITS

video

Sep 18, 2019

Few people have the ability to connect technology, business and people with as much insight and relevance as SAP evangelist Tom Raftery. During his Innovation Talk at the SAP Festival in Brussels, Tom highlighted the impact of new technologies on our personal lives and how enterprises need to be tru...

Read More

Artificial Intelligence and the Future of Jobs ARTIFICIAL INTELLIGENCE AND THE FUTURE OF JOBS

blog article

Sep 18, 2019

My role here at SAP is IoT Evangelist. It’s my job to go around and speak about how the Internet of Things is changing the way we live, work, and run our businesses. IoT Evangelist is a job title that didn’t exist 5 or 10 years ago – mainly because the Internet of Things wasn&rsquo...

Read More

Seven reasons why the Internal Combustion Engine is a dead man walking SEVEN REASONS WHY THE INTERNAL COMBUSTION ENGINE IS A DEAD MAN WALKING

blog article

Sep 18, 2019

The age of the Internal Combustion Engine (ICE) is over. Electric cars are the future. The transition has just begun, but the move from ICE vehicles to Electric will happen sooner and more quickly than most people suspect. What are the factors that lead me to say this with such confidence? However, ...

Read More

How Advanced Attacks are Transforming MSP Endpoint Security HOW ADVANCED ATTACKS ARE TRANSFORMING MSP ENDPOINT SECURITY

infographic

Sep 17, 2019

Most analysts predict managed cyber-security will grow at a CAGR of over 15% in coming years. This trend is no surprise, considering the global shortage of security talent and the increasing sophistication of attacks on data and business productivity. Managed Service Providers (MSPs) are in the best...

Read More

Cyber Crisis: Foundations of Multi-Stakeholder Coordination CYBER CRISIS: FOUNDATIONS OF MULTI-STAKEHOLDER COORDINATION

whitepaper

Sep 17, 2019

In this guide, we lay the foundations for multi-stakeholder coordination during cybersecurity crises that can undermine the security of the digital economy. This guide draws on the diverse international perspectives of CSDE members, as well as their leading practices and realworld actions, to increa...

Read More

Acme Brick builds trust with security framework from IBM ACME BRICK BUILDS TRUST WITH SECURITY FRAMEWORK FROM IBM

video

Sep 17, 2019

Jesse Glaesman, Cyber Security Manager of Acme Brick, explains how his company’s proactive security approach builds trust, insulates customers and protects brand reputation. A longstanding relationship with IBM, including QRadar and X-Force IRIS, ensures Acme Brick can protect the people it se...

Read More

Is AI Worth Your DAM Time? IS AI WORTH YOUR DAM TIME?

blog article

Sep 16, 2019

Tagging based on AI enables assets to be tagged automatically upon ingestion. This smart tagging service creates tags or metadata without human intervention, saving marketers time while reducing the potential for human error. Most importantly, tagging assets or adding metadata to assets using AI imp...

Read More

B2B Marketing Do’s and Don’ts for Attracting Leads B2B MARKETING DO’S AND DON’TS FOR ATTRACTING LEADS

blog article

Sep 16, 2019

For many B2B marketers, attracting and generating leads is often the primary goal. However, how to attract leads varies widely from company to company. While the inbound lead generation strategy should be unique to your firm, there are several best practices or do’s and don’ts for attrac...

Read More

TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019 TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019

blog article

Sep 16, 2019

For any successful business, network systems, data, and their storage account for the most valuable digital assets and that is why such assets pose extreme breach threats causing significant business risk. In this digital age, the dependence of business on these increases their potential vulnerabili...

Read More

How Cybersecurity Can Better Support Digital Transformation Business Goals HOW CYBERSECURITY CAN BETTER SUPPORT DIGITAL TRANSFORMATION BUSINESS GOALS

blog article

Sep 16, 2019

Offering outstanding user experiences and technology interfaces is vital to attracting today’s customers—they demand it. So enterprises leverage ever-growing portfolios of data and systems to differentiate those experiences from their competitors’ offerings, while also strategizing...

Read More

TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020 TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020

blog article

Sep 16, 2019

As the pace of security breaches keeps on expanding, so does the variety of attacks and the advances and procedures set up to counteract them. However, the top threats in the following couple of years will probably be from a kind of hack known to security experts today. Through 2020, 99% of vulnerab...

Read More

5 Ways Field Marketing Can Own ABM 5 WAYS FIELD MARKETING CAN OWN ABM

blog article

Sep 14, 2019

In the last few years, Account-based Marketing has taken over as a better way to engage with modern B2B buyers. When sixty-nine percent of marketers say converting leads is their top priority, a winning ABM strategy requires sound alignment between the sales and marketing functions—and, as the...

Read More

Be aware of Malware BE AWARE OF MALWARE

video

Sep 14, 2019

We’ve all heard of the nasty software that can do serious damage to your computer system – Viruses, Trojans, Worms… and no, we’re not talking about Boggy B and Co. As a group, we call them Malware – AKA “malicious software” – built to exploit chinks i...

Read More

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS

blog article

Sep 14, 2019

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the servic...

Read More

Cybersecurity considerations for electrical distribution systems CYBERSECURITY CONSIDERATIONS FOR ELECTRICAL DISTRIBUTION SYSTEMS

whitepaper

Sep 12, 2019

Every day, cyber attacks against government and commercial computer networks number in the millions. According to U.S. Cyber Command, Pentagon systems are probed 250,000 times per hour. Similar attacks are becoming more prevalent on other kinds of information-based smart networks as well, such as th...

Read More

The Importance of Cybersecurity Whitepaper - Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY WHITEPAPER - THREAT DETECTION FOR UTILITIES

whitepaper

Sep 12, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

5 data privacy and cybersecurity tips for construction firms 5 DATA PRIVACY AND CYBERSECURITY TIPS FOR CONSTRUCTION FIRMS

blog article

Sep 12, 2019

No industry is immune from data privacy and cybersecurity threats, and that includes the construction industry. Here are five data privacy and cybersecurity tips construction firms should consider putting to use to protect themselves against these looming threats. The best way to protect any organiz...

Read More

DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY

infographic

Sep 12, 2019

597 companies in 33 European countries. 80% of leading European businesses say digital transformation is a current strategic priority for their business. with turnovers from less than €30 million to over €300 million. 78% middle market businesses agree that digital transformation is the on...

Read More

Cyber threats and Trends 2019 CYBER THREATS AND TRENDS 2019

whitepaper

Sep 12, 2019

This document is provided in accordance with the terms set forth herein, expressly disclaiming any implied warranties of any kind that may be found to be related. In no event shall the National Cryptologic Centre be held liable for any direct, indirect, incidental or consequential damages arising ou...

Read More

Bigtincan Hub Overview BIGTINCAN HUB OVERVIEW

video

Sep 12, 2019

Bigtincan is the industry's leading Sales Enablement Automation platform, empowering Sales teams to win more and be more productive every day, while providing Marketing the ability to establish ROI on content creation efforts.

Read More

Antivirus Software Overview - Trend Micro Security 2020 ANTIVIRUS SOFTWARE OVERVIEW - TREND MICRO SECURITY 2020

video

Sep 11, 2019

Trend Micro™ Security provides advanced protection and privacy so you can enjoy your digital life safely. It helps protect you from identity theft, in addition to safeguarding against viruses, ransomware, spam, and other malware. Trend Micro Security warns you about dangerous links in email an...

Read More

These Howard County cybersecurity companies formed a biz partnership THESE HOWARD COUNTY CYBERSECURITY COMPANIES FORMED A BIZ PARTNERSHIP

blog article

Sep 11, 2019

Howard County is known for its concentration of cybersecurity companies, and now the proximity is a factor in the formation of a strategic partnership between two of the firms. Through the strategic partnership, Elkridge-based Atlantic Data Forensics (ADF) will use network security tools from Columb...

Read More

Why Companies Are Forming Cybersecurity Alliances WHY COMPANIES ARE FORMING CYBERSECURITY ALLIANCES

blog article

Sep 11, 2019

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha...

Read More

How to Increase Sales Forecasting Accuracy with Automation HOW TO INCREASE SALES FORECASTING ACCURACY WITH AUTOMATION

blog article

Sep 10, 2019

Sales forecasting is the map of estimated sales performance, revenue, and expenses that guide a sales organization in their planning processes. Having an accurate sales forecast is crucial to driving revenue, growth, and profitability. The most successful companies are consistently looking for ways ...

Read More

Is your software vulnerable to cybercrime? IS YOUR SOFTWARE VULNERABLE TO CYBERCRIME?

infographic

Sep 10, 2019

Security patching is essential for securing enterprise software, including Oracle’s. If you can't access the code, you can't develop patches for it. That leaves your software open to attack and your business open to risk. Oracle Support is the best way to legally receive mission critic...

Read More

Cyberthreats throughout the seasons CYBERTHREATS THROUGHOUT THE SEASONS

infographic

Sep 10, 2019

Colds & flu cause staff shortages Simple protection even when IT staff are absent. New beginnings bring new risks Machine learning perfects new detection indicators. Frozen temperatures paralyze IT Cloud-based; immune to extreme weather devastation. March madness despite known risks Message filt...

Read More

Cybersecurity: A governance framework for mobile money providers CYBERSECURITY: A GOVERNANCE FRAMEWORK FOR MOBILE MONEY PROVIDERS

whitepaper

Sep 10, 2019

The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with nearly 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent indust...

Read More

Implementing Buyer Enablement in Your Sales Enablement Strategy (2019) IMPLEMENTING BUYER ENABLEMENT IN YOUR SALES ENABLEMENT STRATEGY (2019)

blog article

Sep 10, 2019

The majority of the time I only had access to two TV channels, three on a good weather day, and I vividly remember when I first saw a color television. At this time, products and services were limited, and buyer choices were almost non-existent. Fast-forward to 2019. Not only do I have access to hun...

Read More

The Role of Sales in Sales Enablement THE ROLE OF SALES IN SALES ENABLEMENT

blog article

Sep 10, 2019

However, with a regular commute time that consumes a couple of hours each day, I have shifted my focus to podcasts and audiobooks. One of my favorite podcasts is the Inside Sales Enablement series by Scott Santucci and Brian Lambert. In their last episode, they spent time reviewing their thoughts an...

Read More

Defending the Philippines in Cyberspace DEFENDING THE PHILIPPINES IN CYBERSPACE

video

Sep 09, 2019

On 29th August 2019, the Teh Group organised the Cyber Attack Manila 2019 at Shangri-la Makati with 400 cyber security professionals from various industries including government and law enforcement.  The event covered themes in cyber security, threat intelligence, cyber investigation... just to...

Read More

Cybersecurity progress this way finally comes CYBERSECURITY PROGRESS THIS WAY FINALLY COMES

blog article

Sep 09, 2019

Given all the high-profile cybersecurity attacks making headlines these days, it’s easy to conclude that organizations are still not making cybersecurity a high enough priority. However, a survey of 867 senior executives conducted by Infosys representing 847 firms from 12 industries, with annu...

Read More

Malware Attack Prompts School District Closure: K-12 Cyber Disruptions Rising MALWARE ATTACK PROMPTS SCHOOL DISTRICT CLOSURE: K-12 CYBER DISRUPTIONS RISING

blog article

Sep 09, 2019

The Flagstaff Unified School District in Arizona is just the latest to fall victm to a cybersecurity attack so disruptive it forced schools to close Thursday and Friday of last week. Schools were back in session on Monday, after the district's team worked "round the clock securing systems a...

Read More

SMBs cite security, backup & recovery as top business concerns SMBS CITE SECURITY, BACKUP & RECOVERY AS TOP BUSINESS CONCERNS

blog article

Sep 09, 2019

Small businesses around the world acknowledge that cybersecurity, backup and data recovery are important aspects of their business, but most of those businesses sit between the two lowest levels of IT maturity. The lack of maturity reflects an ongoing problem that small businesses face – the n...

Read More

4 steps to address the cybersecurity skills shortage 4 STEPS TO ADDRESS THE CYBERSECURITY SKILLS SHORTAGE

blog article

Sep 09, 2019

University of Waikato’s Cybersecurity Researchers of Waikato (CROW), receives weekly requests from companies to see if personnel or students would be interested in applying for a role or an internship in cybersecurity. The government’s strategy notes that 3,445 cybersecurity incidents we...

Read More

Laptop Security: Scariest thing for enterprise owner LAPTOP SECURITY: SCARIEST THING FOR ENTERPRISE OWNER

video

Sep 08, 2019

Presenting BLACKbox duo, class leading data isolation technology protecting enterprise data from leakage or theft from laptops through USB, Email Attachment, BCC and Internet.

Read More

Leitfaden für Führungskräfte: Nutzung von SAP auf Azure für Ihre IT- Transformation Ein kostenloses Whitepaper zur SAP-Bereitstellung in der Cloud LEITFADEN FÜR FÜHRUNGSKRÄFTE: NUTZUNG VON SAP AUF AZURE FÜR IHRE IT- TRANSFORMATION EIN KOSTENLOSES WHITEPAPER ZUR SAP-BEREITSTELLUNG IN DER CLOUD

whitepaper

Sep 06, 2019

Veröffentlicht: 18.01.2019 Die heutige IT-Umgebung erfordert Flexibilität und Agilität. Herkömmliche Ansätze für die Bereitstellung von SAP-Anwendungen können Sie bei der Umsetzung ihres ganzen Potenzials einschränken. Halten Sie Ihre IT durch eine neue Generation an SAP-Einsatzmöglichkeiten auf Mic...

Read More

 Der Total Economic Impact™ von Microsoft Azure für SAP – eine Auftragsstudie von Forrester Consulting DER TOTAL ECONOMIC IMPACT™ VON MICROSOFT AZURE FÜR SAP – EINE AUFTRAGSSTUDIE VON FORRESTER CONSULTING

whitepaper

Sep 06, 2019

Veröffentlicht: 12.04.2019 Erfahren Sie, was Ihnen die Cloudmigration von SAP-Workloads mit Microsoft Azure an Kostenersparnissen und Geschäftsvorteilen bringt. Diese Studie von Forrester Consulting, die von Microsoft in Auftrag gegeben wurde, umfasst eine ausführliche Analyse der Rendite und andere...

Read More

Industrial Cybersecurity: A Proactive Approach Video INDUSTRIAL CYBERSECURITY: A PROACTIVE APPROACH VIDEO

video

Sep 05, 2019

The Industrial Internet of Things is driving a level of increased connectivity that helps companies to improve their overall performance, but also comes with the potential for enterprise risk.  With the potential for huge losses at stake, applying cyber security to industrial control systems me...

Read More

What will 5G mean for business cybersecurity? WHAT WILL 5G MEAN FOR BUSINESS CYBERSECURITY?

blog article

Sep 05, 2019

The coming switch to 5G cellular networks will be a boon to businesses in many ways, but it will also create a vast new “attack surface” for hackers. The main attraction to 5G — “lightning-fast” internet speeds — is also what creates the risk. Why? Because it will...

Read More

3 communication skills all cybersecurity pros should have 3 COMMUNICATION SKILLS ALL CYBERSECURITY PROS SHOULD HAVE

video

Sep 04, 2019

Cheryl Kerrigan, Vice President of People at BlueCat, discusses three communication skills that cybersecurity professionals need to be successful. At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers w...

Read More

Why Artificial Intelligence Will Save Cybersecurity? WHY ARTIFICIAL INTELLIGENCE WILL SAVE CYBERSECURITY?

blog article

Sep 04, 2019

Cybersecurity is in a dire state. Massive breaches are commonplace. A few years ago, 70 million Target customers were affected by a large-scale cyber attack. Target’s CIO was immediately let go in the wake of such an unthinkable disaster. Breaches are affecting more and more citizens. Now 70 m...

Read More

Gartner names Trend Micro leader in endpoint protection platforms GARTNER NAMES TREND MICRO LEADER IN ENDPOINT PROTECTION PLATFORMS

blog article

Sep 03, 2019

Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend Micro has been named a Leader in every Gartner Magic Quadrant for this categ...

Read More

What is Cryptocurrency Mining Malware? WHAT IS CRYPTOCURRENCY MINING MALWARE?

blog article

Sep 02, 2019

Before we get into the details of “Cryptocurrency Mining Malware”, we need to understand first what cryptocurrency is and what miners are. What is Cryptocurrency? Cryptocurrency is best thought of as digital currency  and it only exists on computers. It is transferred between peers ...

Read More

This Has Been the Worst Year for iPhone Security Yet THIS HAS BEEN THE WORST YEAR FOR IPHONE SECURITY YET

blog article

Sep 02, 2019

Earlier this month, in a dimly lit conference room in a swanky Las Vegas conference center, an Apple employee walked up on stage to pick up an award. The ceremony was the Pwnie Awards, a largely tongue in cheek affair that celebrates the best—and in other ways the worst—hacks of the year...

Read More

5 manières de soutenir l’engagement et la productivité de vos employés 5 MANIÈRES DE SOUTENIR L’ENGAGEMENT ET LA PRODUCTIVITÉ DE VOS EMPLOYÉS

whitepaper

Aug 30, 2019

Donner aux employés les bons outils pour travailler de façon optimale peut être difficile dans le monde actuel, en raison de la diversification des appareils et des styles de travail. Cet e-book révèle comment choisir la technologie appropriée pour vos employés : Protégez les données de l’entreprise...

Read More

Seize the power of the cloud: 7 reasons to switch to Microsoft 365 SEIZE THE POWER OF THE CLOUD: 7 REASONS TO SWITCH TO MICROSOFT 365

whitepaper

Aug 30, 2019

Is your on-premises technology holding you back? While you may feel that you have more control over your on-prem solutions, they might be limiting your employees’ ability to collaborate from anywhere using secure apps they already know and love. In this e-book, you’ll see seven ways that Microsoft 3...

Read More

Artificial Intelligence – Helping Cyber Security ARTIFICIAL INTELLIGENCE – HELPING CYBER SECURITY

blog article

Aug 29, 2019

Artificial Intelligence (AI)  is now playing a significant role in helping to managing cyber risk. This was recently evident in the aftermath of the Nordsk Hydro ransomware attack where AI was utilised to identify further vulnerabilities. This form of automative technology would seem to be a go...

Read More

McAfee Labs Threats Report August 2019 MCAFEE LABS THREATS REPORT AUGUST 2019

whitepaper

Aug 29, 2019

Welcome to the McAfee Labs Threats Report, August 2019. In this edition, we highlight the significant investigative research and trends in threats statistics and observations in the evolving threat landscape gathered by the McAfee® Advanced Threat Research and McAfee® Labs teams in Q1 of 201...

Read More

Why must the public sector take a security by design approach? WHY MUST THE PUBLIC SECTOR TAKE A SECURITY BY DESIGN APPROACH?

blog article

Aug 29, 2019

Cyber security is a high-profile issue for UK public sector bodies, as recent news shows. Iain Shearman, Managing Director of KCOM’s National Network Services, looks at why the public sector needs to adopt security by design. It seems that nearly every week there’s some news about how UK...

Read More

Why the New Madison Logic Oracle Eloqua Integration is so Exciting for Marketers WHY THE NEW MADISON LOGIC ORACLE ELOQUA INTEGRATION IS SO EXCITING FOR MARKETERS

video

Aug 29, 2019

Madison Logic is excited to announce a bi-directional integration with Oracle Eloqua, combining best-in-class lead and campaign management skills with Madison Logic’s global reach and advanced targeting. Now Oracle Marketing Automation users are able to align their messaging and targeting thro...

Read More

Two In Three Organizations To Deploy AI In Their Cyber Security System By 2020 TWO IN THREE ORGANIZATIONS TO DEPLOY AI IN THEIR CYBER SECURITY SYSTEM BY 2020

blog article

Aug 29, 2019

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, according to Capgemini Research Institute’s Reinventing Cybersecurity with Artificial Intelligence: The New Frontier in Digital Security study. Two thirds (69%) of organization...

Read More

A new approach to data protection is here A NEW APPROACH TO DATA PROTECTION IS HERE

whitepaper

Aug 29, 2019

To counter modern data security threats, you need to think counterintuitively. Data guardrails and behavioral analytics are new approaches to protecting your data against modern threats — without handcuffing your employees access to the data they need. Download this new Securosis executive summary, ...

Read More

PHISHING ATTACKS ON BIG COMPANIES PHISHING ATTACKS ON BIG COMPANIES

infographic

Aug 28, 2019

Phishing scams are almost always emails that appear to be from a legitimate business that needs your urgent attention on some matter. From there, scammers will try to get you to click on their spoofed, fake and malicious links and steal your credentials. One-click is all these criminals need to gain...

Read More

An effective Cyber-Attack defense solution for your Healthcare or Industrial Neighborhood AN EFFECTIVE CYBER-ATTACK DEFENSE SOLUTION FOR YOUR HEALTHCARE OR INDUSTRIAL NEIGHBORHOOD

video

Aug 28, 2019

In today’s day and age, hackers are getting more sophisticated and are targeting sensitive, potentially vulnerable, and sophisticated targets like Healthcare and Industrial networks. Xilinx Healthcare & Industrial IoT solutions and Zynq UltraScale+ System-on-Chip (SoC) platform provides th...

Read More

Malware Analysis Bootcamp - Examining The Resources Section MALWARE ANALYSIS BOOTCAMP - EXAMINING THE RESOURCES SECTION

video

Aug 28, 2019

Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will be analyzing the resources section. Our objective is to find any additional malicious files or binaries that have been included by the a...

Read More

Why testing user behaviour is crucial to your cyber security WHY TESTING USER BEHAVIOUR IS CRUCIAL TO YOUR CYBER SECURITY

blog article

Aug 28, 2019

Cyberattacks and security breaches have become so widespread that companies are now spending billions of dollars collectively to deal with these threats. Falling victim to attacks such as an advanced persistent threat or a malware attack can cause irreparable damage to their businesses and reputatio...

Read More

A New Tool For Hackers – AI in Cybersecurity A NEW TOOL FOR HACKERS – AI IN CYBERSECURITY

blog article

Aug 28, 2019

The dawn of the internet and advances in computing means we’re able to trigger an exact solution to complex problems in diverse areas - ranging from astrophysics and biological systems to automation and precision. But at the same time, these systems are inherently vulnerable to cyber threats. ...

Read More

Can We Create Future-Proof Organisations by Understanding Today’s Processes? CAN WE CREATE FUTURE-PROOF ORGANISATIONS BY UNDERSTANDING TODAY’S PROCESSES?

whitepaper

Aug 28, 2019

This exclusive IDC InfoBrief examines how the latest disruptive technologies are fueling a revolution in digital transformation. Discover how new technologies can help you reshape how your business functions to reach higher efficiency, productivity and security and sharpen your competitive edge: Clo...

Read More

MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP

infographic

Aug 27, 2019

This IDC Infographic is a snapshot of the results of an Asia/Pacific banking survey to better understand where the cybersecurity gaps and opportunities are for banks to create a more business-focused security strategy. KEY HIGHLIGHTS.

Read More

Security in the era of Industry 4.0 SECURITY IN THE ERA OF INDUSTRY 4.0

whitepaper

Aug 27, 2019

What is commonly referred to as Industry 4.0 is being driven by increased interconnectivity and digitization of production technologies and processes. The possibilities emerging for manufacturers to connect people, machines, factories and digital workspaces are endless. This Industry 4.0 transformat...

Read More

Malware and ransomware protection MALWARE AND RANSOMWARE PROTECTION

video

Aug 27, 2019

You've most likely heard about cyber-attacks and malicious emails but how do malware and ransomware work? This video has valuable information about how an attack gets in and infects your IT system - before potentially damaging your business. It also gives advice on how to prevent attacks using a...

Read More

Can VMware become a leading cybersecurity vendor? CAN VMWARE BECOME A LEADING CYBERSECURITY VENDOR?

blog article

Aug 27, 2019

When you think about VMware and cybersecurity, two products have always stood out. NSX, which has evolved into a common micro-segmentation tool for east/west traffic within ESXi, and AppDefense, which monitors applications, determines “normal” behavior, and detects anomalies. Now, VMware...

Read More

How AI Is Changing The Cyber-Security Landscape HOW AI IS CHANGING THE CYBER-SECURITY LANDSCAPE

blog article

Aug 27, 2019

The use of Artificial Intelligence (AI) has enhanced not only the delivery of services but also improved cybersecurity. It’s estimated that 15% of organizations globally have adopted AI technology in their operations. However, the use of technology has both positive and negative consequences f...

Read More

David Spark is the Ira Glass of the Cybersecurity Industry DAVID SPARK IS THE IRA GLASS OF THE CYBERSECURITY INDUSTRY

video

Aug 26, 2019

Take a few minutes with us as our Man on the Street Matt Stephenson checks in with Cybersecurity Media legend David Spark. We catch up on what David has been up to with his podcast series CISO/Vendor Relationship and Defense in Depth.

Read More

How To Protect Your PC Against Ransomware Easy and Total Free HOW TO PROTECT YOUR PC AGAINST RANSOMWARE EASY AND TOTAL FREE

video

Aug 26, 2019

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to an individual or an organization....

Read More

Ransomware threat raises National Guard RANSOMWARE THREAT RAISES NATIONAL GUARD'S ROLE IN STATE CYBERSECURITY

blog article

Aug 26, 2019

National Guard units already play a large role in state governments’ cybersecurity activities, such as protecting election systems, but the threat of ransomware to cripple a state or city organization is a growing concern for uniformed personnel, the top military official overseeing the Nation...

Read More

CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY? CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY?

blog article

Aug 26, 2019

As the new-age technologies have disrupted the IT industry, several trending topics grab the attention regularly. The automation of mundane and repetitive tasks has become an essential dose for progressive companies. It releases the workforce from such task and directs them towards more creative wor...

Read More

Finding an Access Solution for Your Business: A Guide to Evaluating and Comparing Options: FINDING AN ACCESS SOLUTION FOR YOUR BUSINESS: A GUIDE TO EVALUATING AND COMPARING OPTIONS:

whitepaper

Aug 26, 2019

So, you’ve decided your business could benefit from an access solution. Now what? Finding the right option means understanding your needs as well as what you expect an access solution to do for you, and then finding the product that best delivers on those needs and expectations. To help, we’ve craft...

Read More

Identity 101 for SMBs: A Guide to the Benefits and Features of Identity Solutions: IDENTITY 101 FOR SMBS: A GUIDE TO THE BENEFITS AND FEATURES OF IDENTITY SOLUTIONS:

whitepaper

Aug 26, 2019

Learn why Identity matters, what an Identity solution is, and how an Identity solution can help your business. How can an Identity solution help your business be more secure -- and productive? Today’s business environment is anything but simple – and increased cyber threats just complicate things mo...

Read More

The SMBs Guide to Modern Identity: Bridging the Gap from Passwords to Identity: THE SMBS GUIDE TO MODERN IDENTITY: BRIDGING THE GAP FROM PASSWORDS TO IDENTITY:

whitepaper

Aug 26, 2019

The data is in: 93% of SMBs agree a unified identity solution would greatly benefit the overall security of their organization. LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity for small and medium businesses (SMBs). We surveyed 700 IT and sec...

Read More

Identity 101 for SMBs: A Guide to the Benefits and Features of Identity Solutions: IDENTITY 101 FOR SMBS: A GUIDE TO THE BENEFITS AND FEATURES OF IDENTITY SOLUTIONS:

whitepaper

Aug 26, 2019

Learn why Identity matters, what an Identity solution is, and how an Identity solution can help your business. How can an Identity solution help your business be more secure -- and productive? Today’s business environment is anything but simple – and increased cyber threats just complicate things mo...

Read More

Finding an Access Solution for Your Business: A Guide to Evaluating and Comparing Options: FINDING AN ACCESS SOLUTION FOR YOUR BUSINESS: A GUIDE TO EVALUATING AND COMPARING OPTIONS:

whitepaper

Aug 26, 2019

So, you’ve decided your business could benefit from an access solution. Now what? Finding the right option means understanding your needs as well as what you expect an access solution to do for you, and then finding the product that best delivers on those needs and expectations. To help, we’ve craft...

Read More

The SMBs Guide to Modern Identity: Bridging the Gap from Passwords to Identity: THE SMBS GUIDE TO MODERN IDENTITY: BRIDGING THE GAP FROM PASSWORDS TO IDENTITY:

whitepaper

Aug 26, 2019

The data is in: 93% of SMBs agree a unified identity solution would greatly benefit the overall security of their organization. LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity for small and medium businesses (SMBs). We surveyed 700 IT and sec...

Read More

A Clear Business Reason For Why Cyber Security Is So Important A CLEAR BUSINESS REASON FOR WHY CYBER SECURITY IS SO IMPORTANT

video

Aug 25, 2019

As a vendor of products and services to your clients, you are part of their supply chain. More and more companies are insisting on visibility into the cyber security of their suppliers. Larger companies are demanding to see that the companies they deal with are able to demonstrate that they're a...

Read More

What Is a Zero-Trust Model in Cybersecurity, and What Does It Mean for Federal IT? WHAT IS A ZERO-TRUST MODEL IN CYBERSECURITY, AND WHAT DOES IT MEAN FOR FEDERAL IT?

blog article

Aug 23, 2019

Cybersecurity is a perennial concern inside federal agencies, but the conversation is starting to evolve. In the past, perimeter-based IT security defenses were a major area of investment — keeping malicious actors out of networks and away from sensitive data. Increasingly, the cybersecurity l...

Read More

What’s the Difference Between Antivirus and Endpoint Security? WHAT’S THE DIFFERENCE BETWEEN ANTIVIRUS AND ENDPOINT SECURITY?

blog article

Aug 22, 2019

What’s the difference between antivirus and endpoint security? Why should your enterprise case? How should it affect your enterprise cybersecurity solution decisions? Indeed, the difference between antivirus and endpoint security looks almost indistinguishable from a distance. In fact, antivir...

Read More

Malwarebytes founder and CEO talks the company MALWAREBYTES FOUNDER AND CEO TALKS THE COMPANY'S ORIGIN STORY

video

Aug 22, 2019

Marcin Kleczynski tells the story behind how he and a small band of malware hunters have worked together to build cybersecurity software that can take on the threats traditional antivirus can't handle.

Read More

Why Behavioral Analytics Matter to Enterprise Cybersecurity WHY BEHAVIORAL ANALYTICS MATTER TO ENTERPRISE CYBERSECURITY

blog article

Aug 22, 2019

Why do behavioral analytics matter so much for your enterprise’s cybersecurity? In fact, what even are behavioral analytics? Which threats can it detect most easily? Why do those threats pose the most danger to your business? Your enterprise network continues to scale as more users connect to ...

Read More

The Impact of Artificial Intelligence on Cyber Security THE IMPACT OF ARTIFICIAL INTELLIGENCE ON CYBER SECURITY

blog article

Aug 22, 2019

There is currently a big debate raging about whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life. With more and more enterprises using AI for their needs, it’s time to analyze the possible impacts of the implementation of AI in the cyber security fi...

Read More

Anatomy of Today’s Global Traveler ANATOMY OF TODAY’S GLOBAL TRAVELER

infographic

Aug 22, 2019

Where does the modern traveler come from? Where is s/he going? How does s/he get there? As the world grows ever-smaller, more and more people are traveling to a growing number of places each year. Increasingly, they’re getting there by leveraging digital tools. Savvy travel and hospitality bra...

Read More

ESET Cybersecurity tips & tricks: UEFI scanning ESET CYBERSECURITY TIPS & TRICKS: UEFI SCANNING

video

Aug 21, 2019

Everyone is familiar with the concept that attackers can launch malicious attacks through email, Windows or other software that runs on our laptops. But can the device itself become the target? Like many other parts of a computer system, UEFI can be attacked to gain unauthorized access to the system...

Read More

CyberRisk Alliance acquires Cybersecurity Collaborative CYBERRISK ALLIANCE ACQUIRES CYBERSECURITY COLLABORATIVE

blog article

Aug 21, 2019

Cybersecurity and business intelligence company CyberRisk Alliance recently acquired Cybersecurity Collaborative, a peer council platform for Chief Information Security Officers (CISOs). Cybersecurity Collaborative is a private cross-industry forum for CISOs and security professionals devoted to pee...

Read More

Creating Content That Improves CX: A Q&A with Lionbridge & Aprimo CREATING CONTENT THAT IMPROVES CX: A Q&A WITH LIONBRIDGE & APRIMO

blog article

Aug 21, 2019

Today’s brands face numerous challenges. They need to create a customized, excellent experience for each and every customer worldwide. To do that, they need to create high-quality, on-target content. They need to create that content quickly, effectively, and for audiences who speak multiple la...

Read More