RESOURCES


home.aspx
   
Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud MAINTAIN CONTROL OF YOUR MOST SENSITIVE CONTENT WITH A PRIVATE OR ON-PREMISES CLOUD

blog article

Dec 12, 2019

Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival insti...

Read More

The Crucial role of Cyber security and Artificial Intelligence (AI) THE CRUCIAL ROLE OF CYBER SECURITY AND ARTIFICIAL INTELLIGENCE (AI)

blog article

Dec 11, 2019

Artificial intelligence (AI) is accepting the situation as a warrior against digital threats over the globe. It has gotten mainstream in military space, yet security organizations are likewise consolidating AI technologies for using deep learning to discover likenesses and differences within a data ...

Read More

How to test employee cyber competence through pen-testing HOW TO TEST EMPLOYEE CYBER COMPETENCE THROUGH PEN-TESTING

blog article

Dec 11, 2019

Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help get supposedly ill-gotten cash out of their own country into a safe bank, offering a percentage of the money for their participation. While “Nigerian prince” emails have been scamming people...

Read More

NIST Cybersecurity Framework NIST CYBERSECURITY FRAMEWORK

video

Dec 10, 2019

The NIST Cybersecurity Framework centers on five controls, Identify, Protect, Detect, Respond, and Recover.

Read More

CYBERSECURITY AND AI IN TODAY’S WORLD CYBERSECURITY AND AI IN TODAY’S WORLD

blog article

Dec 10, 2019

In an always advancing cyber threat landscape where antivirus programming and firewalls are viewed as tools of antiquity, companies are currently searching for all the more technologically advanced methods for protecting classified and sensitive data. Artificial intelligence (AI) is accepting the si...

Read More

Cyber Security Expert says AI becoming Sentient is a Concern CYBER SECURITY EXPERT SAYS AI BECOMING SENTIENT IS A CONCERN

video

Dec 09, 2019

Flow Of Wisdom with Sean Anthony is a syndicated, ground-breaking radio talk show which covers subjects such as Technology, AI, Artificial Intelligence, Facebook, Social Media, social engineering, psychology and other subjects that don't usually get covered on most media platforms.

Read More

Government GOVERNMENT'S CYBER SECURITY STRATEGY PANEL 'MISSING A BIT OF DIVERSITY': AUSTCYBER CEO

blog article

Dec 09, 2019

An advisory panel that will guide the Australian government's new security strategy "does not reflect the full breadth of challenges facing the country," according to AustCyber CEO, Michelle Price.The panel selection has attracted different points of view from across the tech sector wi...

Read More

Facebook Alleges Company Infiltrated User Accounts for Ad Fraud FACEBOOK ALLEGES COMPANY INFILTRATED USER ACCOUNTS FOR AD FRAUD

blog article

Dec 06, 2019

Facebook has sued a Chinese company that it alleges used malware to compromise hundreds of thousands of user accounts – and then used them to run “deceptive ads” promoting counterfeit goods. The company in question is Hong Kong-based ILikeAd Media International Company Ltd., which ...

Read More

Face scanning – privacy concern or identity protection? FACE SCANNING – PRIVACY CONCERN OR IDENTITY PROTECTION?

blog article

Dec 05, 2019

On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial reaction, like mine, could be that this is an infringement of privacy rights. After all, why does any gover...

Read More

Project Blackfin: Automated Breach Detection Using Intelligent Agents PROJECT BLACKFIN: AUTOMATED BREACH DETECTION USING INTELLIGENT AGENTS

whitepaper

Dec 04, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes...

Read More

What are the major cyber security challenges we face today? WHAT ARE THE MAJOR CYBER SECURITY CHALLENGES WE FACE TODAY?

video

Dec 04, 2019

Cyber security experts from the Birmingham Centre for Cyber Security and Privacy and industry discuss the major challenges we face in securing our devices and systems in an ever-more connected world.

Read More

Digital Privacy vs. Cybersecurity: The Confusing Complexity of Information Security in 2020 DIGITAL PRIVACY VS. CYBERSECURITY: THE CONFUSING COMPLEXITY OF INFORMATION SECURITY IN 2020

blog article

Dec 04, 2019

There is a small and potentially tumultuous revolution building on the horizon of 2020. Ironically, it’s a revolution very few people on the street are even aware of but literally every single corporation around the globe currently sits in finger-biting, hand-wringing anticipation: is it ready...

Read More

A strong cybersecurity strategy for device manufacturers A STRONG CYBERSECURITY STRATEGY FOR DEVICE MANUFACTURERS

video

Dec 03, 2019

The Thales Trusted Key Manager delivers the industry’s most advanced encryption tools and provides a security interface that interactes with a variety of IoT platforms through APIs. A unique platform to manage the security of large fleets of devices from various manufacturers.

Read More

How AI is Transforming the Cybersecurity Landscape  Gabriel Tremblay HOW AI IS TRANSFORMING THE CYBERSECURITY LANDSCAPE GABRIEL TREMBLAY

video

Dec 02, 2019

In this episode of Devo Talks, our guest Gabriel Tremblay shares some insight on how his company, Delve Labs is using artificial intelligence to tackle cybersecurity.  Before Gabriel was CEO of Delve Labs, he had the opportunity to help organize and start NorthSec, the largest cybersecurity con...

Read More

61% of malicious ads target Windows users 61% OF MALICIOUS ADS TARGET WINDOWS USERS

blog article

Dec 02, 2019

Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon. The company said that based on data gathered by its internal tools, 61% of the malicious ads they've observed from between July 11 and November 22, 2019 were ...

Read More

What Does IMDRF WHAT DOES IMDRF'S NEW CYBERSECURITY GUIDANCE MEAN FOR YOU?

blog article

Dec 02, 2019

In the age of connectivity, cybersecurity has become critical to all stakeholders in the medical device field. Different federal agencies in the United States (U.S.), as well as agencies across the globe, have begun to address this issue through regulatory guidance and enforcement action. The U.S. h...

Read More

Cyber Security What Makes a Strong Password CYBER SECURITY WHAT MAKES A STRONG PASSWORD

infographic

Dec 01, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Warring State - China WARRING STATE - CHINA'S CYBERSECURITY STRATEGY

whitepaper

Dec 01, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generat...

Read More

Cognizant—2019 Cyber Security Trends COGNIZANT—2019 CYBER SECURITY TRENDS

infographic

Nov 30, 2019

The European union ‘s general data protection regulation covers more than 500 million citizens in 28 countries. Devising and executing a compliance plan is a significant challenge, as shown by the fact that 72% .

Read More

MITRE, CISA, DHS Announce 25 Most Dangerous Software Errors MITRE, CISA, DHS ANNOUNCE 25 MOST DANGEROUS SOFTWARE ERRORS

blog article

Nov 29, 2019

The Common Weakness Enumeration (CWE™) released its Top 25 Most Dangerous Software Errors (CWE Top 25), a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software."These weaknesses are often easy to find and exploit. They are d...

Read More

DeltaV SIS™ and Cybersecurity DELTAV SIS™ AND CYBERSECURITY

whitepaper

Nov 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for...

Read More

The Need for a Security Culture to Combat Cyber Threats THE NEED FOR A SECURITY CULTURE TO COMBAT CYBER THREATS

blog article

Nov 28, 2019

The shipping industry is the lifeblood of the worldwide economy. Through the global maritime community, vessels and port facilities are highly dependent on sophisticated technologies, and vessels are increasingly using systems that depending on digitization, digitalization, integration and automatio...

Read More

PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING

blog article

Nov 27, 2019

Ignorance is the most commonly blamed factor in large-scale cyberattacks, but it’s worth remembering that there are at least two types of ignorance, one being the lack of threat sharing. It’s true that many employees – especially in the public sector – remain ill-informed whe...

Read More

Tech SA: UTSA could benefit from cybersecurity bill TECH SA: UTSA COULD BENEFIT FROM CYBERSECURITY BILL

video

Nov 26, 2019

A bill would allow DHS to work with five universities to train state and local governments on cybersecurity.

Read More

Michigan Minds: Cyber Security and Privacy MICHIGAN MINDS: CYBER SECURITY AND PRIVACY

video

Nov 26, 2019

Created by #UMSocial within the Office of the Vice President for Communications at the University of Michigan.

Read More

GuardSight - NIST Cybersecurity Framework GUARDSIGHT - NIST CYBERSECURITY FRAMEWORK

video

Nov 26, 2019

GuardSight is a cybersecurity consulting firm and an established provider of specialized cybersecurity services. Our cybersecurity protection packages, automation, and data science techniques compliment our elite and reliable cybersecurity experts.

Read More

5 Digital Threats to Watch Out for on Black Friday 5 DIGITAL THREATS TO WATCH OUT FOR ON BLACK FRIDAY

blog article

Nov 26, 2019

The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food and good company. Once they’ve put away the leftovers, many Americans don their coats and head to the malls for Black Friday. The official start to the Chri...

Read More

Spear Phishing: Important Things You Should Know to Stay Safe SPEAR PHISHING: IMPORTANT THINGS YOU SHOULD KNOW TO STAY SAFE

blog article

Nov 26, 2019

It’s something that most think while on a break from work, only to be caught up by their duties and responsibilities soon. They get the better of them and the question remains unanswered. It seems relatable, right? I am pretty sure it is. But hey! Let’s concentrate on the answer and it&r...

Read More

The Importance of Cybersecurity Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY THREAT DETECTION FOR UTILITIES

whitepaper

Nov 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

Cybersecurity reporter debunks Trump CYBERSECURITY REPORTER DEBUNKS TRUMP'S CROWDSTRIKE CLAIMS

video

Nov 25, 2019

New York Times cybersecurity reporter Nicole Perlroth speaks to CNN's Jim Sciutto about CrowdStrike conspiracy theories and how they relate not only to the 2016 presidential election, but the upcoming 2020 race as well.

Read More

Traversing The Route From Technology To Privacy Best Practice Guide TRAVERSING THE ROUTE FROM TECHNOLOGY TO PRIVACY BEST PRACTICE GUIDE

whitepaper

Nov 25, 2019

Balancing digital transformation efforts with staying compliant and applying relevant privacy policies requires a real survival guide. In this set of Best Practices you’ll find actionable steps to implement in your organisation to: Prepare for digital transformation Explore new privacy regulations D...

Read More

LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET

blog article

Nov 24, 2019

From Florida to a group of cities in Texas, even Baltimore to Atlanta, the frequency of ransomware attacks against local governments is rapidly rising. A recent report from Barracuda Networks confirmed that out of hundreds of attacks, nearly two-third of ransomware attacks targeted local government ...

Read More

Security lapse exposes personal data of 6,500 Singapore accountants SECURITY LAPSE EXPOSES PERSONAL DATA OF 6,500 SINGAPORE ACCOUNTANTS

blog article

Nov 22, 2019

A folder containing personal data of 6,541 accountants in Singapore was "inadvertently" sent to multiple parties, in a security lapse that was uncovered only months after when a review was conducted. The incident exposed personal details such as names, national identification number, date ...

Read More

Aprimo Workspace Experiences - Striking and Simple APRIMO WORKSPACE EXPERIENCES - STRIKING AND SIMPLE

video

Nov 21, 2019

Watch Aprimo's modern workspaces in action. For the digital workplace, there's robust data visualization, agile features and more together in a frictionless enterprise experience. See your content, operations and performance through a whole new lens!

Read More

4G to 5G Migration - The Changing Role of Security  5G Cybersecurity 4G TO 5G MIGRATION - THE CHANGING ROLE OF SECURITY 5G CYBERSECURITY

video

Nov 21, 2019

Fortinet’s security solutions for 4G and 5G provide a common set of security tools and solutions enabling a safe transition from 4G to 5G and the secure delivery of 5G’s unique use cases such as MEC and Network Slicing.

Read More

Think Auburn: Cybersecurity THINK AUBURN: CYBERSECURITY

video

Nov 20, 2019

Auburn University and the Samuel Ginn College of Engineering are taking the lead as an institution on the forefront of cybersecurity research and professional preparedness in the industry.

Read More

Cybersecurity: We Are All Stakeholders CYBERSECURITY: WE ARE ALL STAKEHOLDERS

video

Nov 20, 2019

According to Scott Jamar, VP of Industry Relations, the best approach to security is to view all networks as potential risks. When it comes to cybersecurity, we all have roles to play.

Read More

The Future of Security is Converged THE FUTURE OF SECURITY IS CONVERGED

blog article

Nov 20, 2019

Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT. However, as threats evolve and as bad actors become more intelligent, and with the goal of being proac...

Read More

Skeye - Cybersecurity for Medical Devices SKEYE - CYBERSECURITY FOR MEDICAL DEVICES

video

Nov 19, 2019

Skeye is a vendor-agnostic cybersecurity solution for networked medical devices that leverages medical device expertise, artificial intelligence, systematic processes, and security professionals to help keep your medical devices resilient in the face of cybersecurity risk.

Read More

Alex Stamos: Creating a Thorough Cyber Defense System ALEX STAMOS: CREATING A THOROUGH CYBER DEFENSE SYSTEM

video

Nov 19, 2019

Alex Stamos is the former Chief of Security at Facebook & an adjunct Professor at Stanford. Stamos is a cybersecurity expert, business leader and entrepreneur whose career has focused on improving the security and safety of the Internet. In this video, Stamos talks about the US's offensive a...

Read More

2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS 2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS

blog article

Nov 19, 2019

Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a ...

Read More

SMART CITIES AND CYBERSECURITY: THE ESSENTIALS SMART CITIES AND CYBERSECURITY: THE ESSENTIALS

blog article

Nov 19, 2019

With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag...

Read More

2020 Workplace Learning Trends Report: The Skills of the Future 2020 WORKPLACE LEARNING TRENDS REPORT: THE SKILLS OF THE FUTURE

whitepaper

Nov 19, 2019

With large-scale technology disruption, organizations will need to respond in a transformational way. It means rethinking how organizations approach workforce skills and talent management. This report highlights the future skills your organization will need in 2020 and how you can prepare your workf...

Read More

The Navy THE NAVY'S NETWORKS ARE VULNERABLE TO CYBER ATTACKS IT'S TIME FOR ACTION

blog article

Nov 18, 2019

The threat to the U.S. Navy from cyber intrusion has become a crisis. Hackers, particularly those from Russia and China, are not limiting themselves to attacks on computers and networks. Now they are engaged in a massive assault on the entire Navy enterprise, including ships, weapons systems, resear...

Read More

2020 Workplace Learning Trends Report The Skills of the Future 2020 WORKPLACE LEARNING TRENDS REPORT THE SKILLS OF THE FUTURE

whitepaper

Nov 18, 2019

With large-scale technology disruption, organizations will need to respond in a transformational way. It means rethinking how organizations approach workforce skills and talent management. This report highlights the future skills your organization will need in 2020 and how you can prepare your workf...

Read More

Mid-Year Threat Landscape Report MID-YEAR THREAT LANDSCAPE REPORT

whitepaper

Nov 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the prolif...

Read More

Awesome Cyber Security Facts - Infographic AWESOME CYBER SECURITY FACTS - INFOGRAPHIC

whitepaper

Nov 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More

What Is a Value Chain for Security WHAT IS A VALUE CHAIN FOR SECURITY

whitepaper

Nov 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More

VA continues to struggle with information security, watchdogs say VA CONTINUES TO STRUGGLE WITH INFORMATION SECURITY, WATCHDOGS SAY

blog article

Nov 15, 2019

Two watchdog agencies told lawmakers Thursday that the Veterans Affairs Department continues to struggle with cybersecurity issues, despite recent improvements. Audits have identified numerous information security vulnerabilities—and insufficient attempts to remedy them—at the VA, leader...

Read More

Sept principes essentiels de la sécurité et de la confidentialité dans le cloud SEPT PRINCIPES ESSENTIELS DE LA SÉCURITÉ ET DE LA CONFIDENTIALITÉ DANS LE CLOUD

whitepaper

Nov 15, 2019

Parcourir les dimensions de la sécurité dans le cloud et appliquer les meilleures pratiques dans un contexte réglementaire en constante évolution sont des tâches ardues et les enjeux sont élevés. En outre, plus votre infrastructure est complexe, plus il est difficile de respecter la conformité, puis...

Read More

Maximisez vos investissements Power BI, Tableau et Qlik MAXIMISEZ VOS INVESTISSEMENTS POWER BI, TABLEAU ET QLIK

whitepaper

Nov 15, 2019

L’investissement dans des outils analytiques - tels que Power BI, Tableau ou Qlik - amorce la transformation de l’entreprise. La façon dont vous amplifiez votre investissement dans les outils et procédures analytiques détermine le cours de votre activité pour les années à venir. Dans Maximisez vos i...

Read More

Quatre façons de maximiser vos investissements en Business Intelligence QUATRE FAÇONS DE MAXIMISER VOS INVESTISSEMENTS EN BUSINESS INTELLIGENCE

whitepaper

Nov 15, 2019

Si votre entreprise ressemble à beaucoup d’autres, vous cherchez des moyens de valoriser au maximum les investissements que vous avez réalisés dans votre programme de données. Cela peut inclure l’implémentation de la sécurité des données, l’unification des silos de données et la fourniture d’analyti...

Read More

MEASURING ORGANIZATION’S CYBERSECURITY MEASURING ORGANIZATION’S CYBERSECURITY

blog article

Nov 15, 2019

No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought...

Read More

Cybersecurity: Are Nation State cybersecurity threats real? CYBERSECURITY: ARE NATION STATE CYBERSECURITY THREATS REAL?

video

Nov 14, 2019

Brad Prent, senior security consultant, ENCS discusses the nation state cybersecurity threats, the steps the energy industry can take to protect itself and the future evolution of cybersecurity.

Read More

Infographic - 2019 SonicWall Cyber Threat Report INFOGRAPHIC - 2019 SONICWALL CYBER THREAT REPORT

infographic

Nov 14, 2019

A cyberattack is personal. At its core, they strip organizations, their employees, partners and customers of intellectual property, identities, privacy, reputation and monetary assets. Follow the attack trends to understand how and where cybercriminals are targeting enterprises, government agencies ...

Read More

Balancing Patient Engagement and Awareness with Medical Device Cybersecurity BALANCING PATIENT ENGAGEMENT AND AWARENESS WITH MEDICAL DEVICE CYBERSECURITY

blog article

Nov 14, 2019

Medical devices are increasingly more advanced and interconnected, sharing information via Wi-Fi, the internet, our phones and across hospital networks. While the software and networking features behind these devices can support safer, more convenient and timely health care delivery, they also can i...

Read More

Perils of the open office PERILS OF THE OPEN OFFICE

infographic

Nov 13, 2019

Open offices are often loud, chaotic, and full of distractions that keep your team from getting work done. That’s where we come in, with solutions that avert open office perils. Open offices are often loud, chaotic, and full of distractions that keep your team from getting work done. That&rsqu...

Read More

Cyber Security: Defending your digital business CYBER SECURITY: DEFENDING YOUR DIGITAL BUSINESS

whitepaper

Nov 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, busin...

Read More

Enterprises Need to Focus on Cybersecurity Strategies Around 5G ENTERPRISES NEED TO FOCUS ON CYBERSECURITY STRATEGIES AROUND 5G

blog article

Nov 13, 2019

Companies need to implement technologies like virtualization and automation to protect themselves from cyber threats that 5G will bring. AT&T has prepared the report after surveying 704 security practitioners from North America, Australia, and the UK, to know how prepared enterprises are for the...

Read More

CYBER SECURITY FOR ECONOMIC GROWTH CYBER SECURITY FOR ECONOMIC GROWTH

video

Nov 12, 2019

This year’s Cyber Defense East Africa conference has been centered around addressing issues of cyber security in a bid to tackle digital insecurities.

Read More

Jeremy Corbyn says timing of Labour cyber-attack is suspicious JEREMY CORBYN SAYS TIMING OF LABOUR CYBER-ATTACK IS SUSPICIOUS

video

Nov 12, 2019

The Labour leader has said of the cyber-attack on the party's digital platform: ‘If this was a sign of things to come in this election, I feel very nervous.’ The party said it had experienced a ‘sophisticated and large-scale cyber-attack’ on its digital systems from an un...

Read More

Tips for Staying Safe Online TIPS FOR STAYING SAFE ONLINE

blog article

Nov 12, 2019

Almost one-fifth of organisations in Ireland have reported at least one technology-related security incident in the last 12 months. According to the Central Statistics Office (CSO), these attacks can have significant consequences, with 5% reporting that it resulted in the destruction or corruption o...

Read More

Hire hackers, halt cyber attacks and safeguard your data HIRE HACKERS, HALT CYBER ATTACKS AND SAFEGUARD YOUR DATA

blog article

Nov 12, 2019

At a time when cyber attacks on businesses across industries are multiplying as they go digital, joining hacker-powered bug bounty and vulnerability disclosure programmes is the key to minimise such incidents and safeguard your key data, a top cyber security officer said on Tuesday.Hacker-powered se...

Read More

POLY HELPS EMPOWER CONTACT CENTER WORKERS POLY HELPS EMPOWER CONTACT CENTER WORKERS

blog article

Nov 11, 2019

It’s a well-documented trend that the rise of digital channels such as webchat, apps, FAQs, etc., has led to a change in the way contact centers handle interactions. The routine, “easy” interactions are now handled by self-service channels. Deflecting these low-value interactions h...

Read More

Hyperspecialization in cybersecurity Cyber Work Podcast HYPERSPECIALIZATION IN CYBERSECURITY CYBER WORK PODCAST

video

Nov 11, 2019

John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding.

Read More

AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G AT&T CYBERSECURITY INSIGHTS™ REPORT: SECURITY AT THE SPEED OF 5G

blog article

Nov 11, 2019

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model.  This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professiona...

Read More

How we can make Americans safer online HOW WE CAN MAKE AMERICANS SAFER ONLINE

blog article

Nov 11, 2019

Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of time and energy has been devoted to improving cybersecurity and cyber hygiene. Sadly, despite thos...

Read More

Councils lack resources to manage cyber threats COUNCILS LACK RESOURCES TO MANAGE CYBER THREATS

blog article

Nov 11, 2019

Local Government Professionals Australia has made a submission to the federal government’s 2020 Cyber Security Strategy identifying ways it can support local government. A report surveying local government CEOs and general managers, JLT Public Sector Risk Report 2019, by risk consultancy JLT i...

Read More

GBM Security Whitepaper GBM SECURITY WHITEPAPER

whitepaper

Nov 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation ...

Read More

Cybersecurity and Cyber Resilience Perception Gaps CYBERSECURITY AND CYBER RESILIENCE PERCEPTION GAPS

video

Nov 10, 2019

Protecting IT against cyber threats is a strategic priority for businesses. But as IT ecosystems grow beyond the four walls of your organization, there may be a number of grey areas on security and resilience responsibilities.

Read More

Master of Science in Cybersecurity Law MASTER OF SCIENCE IN CYBERSECURITY LAW

video

Nov 08, 2019

Markus Rauschecker, Director of the Cybersecurity Program at Maryland Carey Law's Center for Health and Homeland Security discusses the Master of Science in Law program.

Read More

7 truths to improve your software security program 7 TRUTHS TO IMPROVE YOUR SOFTWARE SECURITY PROGRAM

infographic

Nov 07, 2019

The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix Ten years of data gathered from 100+ initiatives provide a bird’s-eye view of software security. You can apply lessons from the Building Securit...

Read More

Is Working in Cybersecurity Fun? IS WORKING IN CYBERSECURITY FUN?

video

Nov 07, 2019

I share what cybersecurity professionals had to say about what they found fun and enjoyable in their work.

Read More

Protect the Business from Edge to AI with Cloudera Cybersecurity PROTECT THE BUSINESS FROM EDGE TO AI WITH CLOUDERA CYBERSECURITY

blog article

Nov 07, 2019

Gartner estimates 30x connected device growth by 2020.  Faster 5G networks bringing an explosion of inexpensive, connected devices. This enables new and more innovative applications and capabilities to improve customer experience.  However, all these new applications and connections also b...

Read More

10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME 10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME

blog article

Nov 06, 2019

When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year. Being cautious while tending to financial transactions won’t ensure that you are cyber safe. ...

Read More

IoT Cybersecurity vision 2018-2019 IOT CYBERSECURITY VISION 2018-2019

whitepaper

Nov 06, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by s...

Read More

This Website Has Solved Cybersecurity THIS WEBSITE HAS SOLVED CYBERSECURITY

blog article

Nov 06, 2019

Big companies that hold our personal data get hacked almost every day, but most don’t really know how to deal with getting hacked, especially when it comes to telling users what happened. If you’ve read some data breach disclosures or notices, you know the classic “we take your pri...

Read More

Facebook Privacy Breach: 100 Developers Improperly Accessed Data FACEBOOK PRIVACY BREACH: 100 DEVELOPERS IMPROPERLY ACCESSED DATA

blog article

Nov 06, 2019

Facebook said that 100 third-party app developers have improperly accessed the names and profile pictures of members in various Facebook groups – data that was restricted in 2018 by the platform after its Cambridge Analytica privacy snafu. Facebook said that the developers – including 11...

Read More

Get Out! The FUD Is Coming from the Inside GET OUT! THE FUD IS COMING FROM THE INSIDE

blog article

Nov 05, 2019

On LinkedIn, Ron C. of CoreSolutions Software said, “Cybersecurity is no longer just a technical problem. It’s now more of a people problem! So why aren’t businesses prioritizing security awareness training for their staff?” There was a massive response and mixed agreement. R...

Read More

Are You Prepared for a Ransomware Attack? ARE YOU PREPARED FOR A RANSOMWARE ATTACK?

blog article

Nov 04, 2019

What if you walked into your office tomorrow and you couldn’t access any of your data–and neither could anyone else on your network? For a growing number of businesses and local governments, that nightmare has become a reality this year thanks to a growing number of ransomware attacks. I...

Read More

Insider tips from a cybersecurity CEO  Cyber Work Podcast INSIDER TIPS FROM A CYBERSECURITY CEO CYBER WORK PODCAST

video

Nov 04, 2019

Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of transparency in job listings and ways to fix the cyber skills gap.

Read More

Recoding Capabilities: Cyber Security  GOFORE RECODING CAPABILITIES: CYBER SECURITY GOFORE

video

Nov 04, 2019

Buying cyber security is like buying an insurance. You have to think ahead to avoid disasters. Gofore is an expert in digitalisation. We help our customers to build sustainable, and safe, digital solutions. If you are ready to your system security audit, visit our website gofore.com. Let's make ...

Read More

Healthcare cyberattacks raise questions about cybersecurity training HEALTHCARE CYBERATTACKS RAISE QUESTIONS ABOUT CYBERSECURITY TRAINING

blog article

Nov 04, 2019

A recent search showed the Office for Civil Rights was investigating 548 such breaches in the last 24 months. These included health information breaches at hospitals, cancer centers, hospice facilities, group practices and more.Perhaps as concerning as the rate at which these healthcare cyberattacks...

Read More

CEOs on their Digital Strategy and Cyber Security CEOS ON THEIR DIGITAL STRATEGY AND CYBER SECURITY

video

Nov 03, 2019

Over half of CEOs say that a strong cyber strategy is critical to building trust with key stakeholders. Hear more from Tim Wood, Partner- Digital and Innovation at KPMG Lower Gulf in this video.

Read More

INFOGRAPHIC: CYBER SECURITY TRENDS FOR 2019 INFOGRAPHIC: CYBER SECURITY TRENDS FOR 2019

infographic

Nov 01, 2019

Each year, DXC Technology’s security advisors, technologists and partners analyze emerging trends to help security organizations plan and set priorities. Based on the DXC Security Trends for 2019, enterprises must guard against a wide range of threats and emerging operational technology risks,...

Read More

A Security Failure in the White House A SECURITY FAILURE IN THE WHITE HOUSE

blog article

Nov 01, 2019

At the time, ODNI predicted similar Russian efforts in the future. That prediction has come to pass: The FBI has reported Russian efforts against the 2020 elections. Nor are they the only ones taking aim at U.S. elections. Facebook recently found evidence of Iranian operations against the Trump camp...

Read More

Protect Your APIs PROTECT YOUR APIS

whitepaper

Nov 01, 2019

API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing ...

Read More

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath SMBS LACK RESOURCES TO DEFEND AGAINST CYBERATTACKS, PLUS PAY MORE IN THE AFTERMATH

blog article

Oct 31, 2019

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks much like the a...

Read More

Cybersecurity made simple: five steps SMEs can take to guard against attack CYBERSECURITY MADE SIMPLE: FIVE STEPS SMES CAN TAKE TO GUARD AGAINST ATTACK

blog article

Oct 31, 2019

Cybersecurity can be an intimidating subject for many small and medium businesses because the threats are so varied, from email fraud and ransomware infections to data breaches. But behind the technical descriptions of the types of risks, there are actually some simple, straightforward actions you c...

Read More

Mimecast: Tackling Cybersecurity in a connected economy MIMECAST: TACKLING CYBERSECURITY IN A CONNECTED ECONOMY

blog article

Oct 31, 2019

Mimecast, founded in 2003, is an international cyber resilience company, with offices in the UK, US, South Africa, Australia, Europe and the Middle East. Mimecast uses dispersed data centers, intelligent mail routing and robust cloud security to provide a security network capable of managing over 35...

Read More

Expert Advise On New ‘Unremovable’ xHelper Malware EXPERT ADVISE ON NEW ‘UNREMOVABLE’ XHELPER MALWARE

blog article

Oct 31, 2019

Over the past six months, the xHelper Android malware strain has made a name for itself after popping up on the radar of several antivirus companies, and annoying users thanks to a self-reinstall mechanism that has made it near impossible to remove. First spotted back in March but slowly expanded to...

Read More

Tips to Protect It: National Cybersecurity Awareness Month TIPS TO PROTECT IT: NATIONAL CYBERSECURITY AWARENESS MONTH

video

Oct 30, 2019

Held every October, National Cybersecurity Awareness Month is a collaborative effort between the government and the industry to raise awareness about the importance of cybersecurity and to provide the resources we need to be safer and more secure online. In our short video series, we'll be givin...

Read More

Insider Threats: A Problem That is Preventable INSIDER THREATS: A PROBLEM THAT IS PREVENTABLE

blog article

Oct 30, 2019

Earlier this summer, I read a fascinating story about McAfee launching a lawsuit against three former employees. The lawsuit alleged that these employees conspired to steal trade secrets on behalf of their new employer, accusing them of moving to a competitor and exfiltrating business-sensitive docu...

Read More

Say It Loud! I Didn’t Read the Privacy Policy and I’m Proud! SAY IT LOUD! I DIDN’T READ THE PRIVACY POLICY AND I’M PROUD!

blog article

Oct 29, 2019

We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. W...

Read More

Explainer: All you need to know about Joburg cyber attack EXPLAINER: ALL YOU NEED TO KNOW ABOUT JOBURG CYBER ATTACK

video

Oct 29, 2019

City Power warned customers on October 25 they could not report faults via the city's call centre due to a computer network security breach by a group seeking a bitcoin ransom. The city reported a breach of its network late on October 24 night and shut down its website e-services. Here's wha...

Read More

90 Seconds of Security: Malware Primer 90 SECONDS OF SECURITY: MALWARE PRIMER

video

Oct 29, 2019

A quick explanation of the different types of malware, how infections happen and what to do if you get infected. Courtesy of F5's Security Incident Response Team.

Read More

2019 Top Three Privacy Trends in US Lawmaking 2019 TOP THREE PRIVACY TRENDS IN US LAWMAKING

blog article

Oct 29, 2019

The original version of this blog, excluding NICE references, was initially published in Lydia de la Torre's Medium Blog. The version below has been extensively edited. The original version can be accessible here. The year 2019 began with a significant increase in bill introductions at the State...

Read More

What Do Hurricanes and Cybersecurity Have in Common? WHAT DO HURRICANES AND CYBERSECURITY HAVE IN COMMON?

blog article

Oct 29, 2019

With hurricanes intensifying, it’s not hard to imagine this scenario: it’s early October and the Weather Channel is extensively covering a hurricane that’s going to hit the East Coast of the United States in five days. Right now, it’s just a tropical storm somewhere near Cuba...

Read More

The Future of AI in Cybersecurity THE FUTURE OF AI IN CYBERSECURITY

blog article

Oct 29, 2019

The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed on products ranging from smartwatches to washing machines and of course every security tool on the market. Advertisements lead us to believe that if you couldn’t find a way t...

Read More

3 Reasons the Time is Right for Remote Reading 3 REASONS THE TIME IS RIGHT FOR REMOTE READING

whitepaper

Oct 29, 2019

Teleradiology and its enabling technologies were initially hailed simply for facilitating after-hours emergency consults and allowing radiologists to avoid overnight calls. Nearly three decades later, teleradiology is expected to be an $8.24 billion business by 2024, offering flexible work options f...

Read More

What’s behind your cyber security strategy? WHAT’S BEHIND YOUR CYBER SECURITY STRATEGY?

video

Oct 28, 2019

Trend Micro partnered with ITWeb Brainstorm in hosting another thought-provoking executive discussion on cyber security, the evolving risks and the new challenges.

Read More

2020 Cyber Security Trends You Should Be Aware Of 2020 CYBER SECURITY TRENDS YOU SHOULD BE AWARE OF

blog article

Oct 28, 2019

Cybersecurity is a fast-evolving game of wits where hackers and defenders continue to outmanoeuvre one another. Staying up to date with the latest trends in cybersecurity is not only beneficial; it’s imperative for everyone involved. Large-scale data breaches always make it to the headlines &n...

Read More

For cyber security, information security and data security DriveLock is your partner FOR CYBER SECURITY, INFORMATION SECURITY AND DATA SECURITY DRIVELOCK IS YOUR PARTNER

video

Oct 24, 2019

DriveLock SE, is headquartered in Munich, Germany with offices in Pleasanton, USA and Sydney, Australia and has become one of the leading Endpoint Protection Platform software vendors over the past 15 years.

Read More

What is cyber security? WHAT IS CYBER SECURITY?

blog article

Oct 24, 2019

Cyber security is the practice of reducing the risk of cyber attacks, which pose a threat to computers, servers, mobile phones, electronic systems and networks. Also known as Information Technology Security, or Electronic Information Security, it is broadly split into three ‘pillars’; pe...

Read More

Will AI Driven Cyber Security Help Stop Malicious Attacks? WILL AI DRIVEN CYBER SECURITY HELP STOP MALICIOUS ATTACKS?

blog article

Oct 24, 2019

In this era of modern technology, cyber-attacks occur in many cases and are predominant than ever before.  Artificial Intelligence in cyber security has been helping IT professionals to predict and block the cyber-attacks more effectively. AI has shaken the cybersecurity industry with its aston...

Read More

BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE

blog article

Oct 23, 2019

If you’re like me, one of the first things you do when you leave the house in the morning is put on your headset. I may be joining a meeting, calling a friend, getting coffee – sometimes all three – before I even set foot in the office. When I get to work, I’m collaborating w...

Read More

Four Key Strategies to Combat Ransomware FOUR KEY STRATEGIES TO COMBAT RANSOMWARE

blog article

Oct 23, 2019

The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact, and recommendations for recovery and continuity in the face of the growing threat. Our report reveals that 85% of MSPs surveyed report ransomware as the most common malware threat to sm...

Read More

How America HOW AMERICA'S CYBER STRATEGY COULD CREATE AN INTERNATIONAL CRISIS

blog article

Oct 23, 2019

The United States has adopted a new cyber warfare strategy focused on “persistent engagement” and “forward defense” in an attempt to thwart Chinese, Russian and other state-sponsored cyber attacks. While this unprecedented “defend forward” approach gives America m...

Read More

TENABLE IS A LEADER IN THE FORRESTER WAVE™Q4 2019 TENABLE IS A LEADER IN THE FORRESTER WAVE™Q4 2019

whitepaper

Oct 23, 2019

Tenable ranks highest in the strategy and current offering categories. “Tenable is a great choice for enterprises looking for a VRM vendor that provides strong prioritization and reporting across device types,” according to a Forrester report. We believe this report reinforces Tenable’s Cyber Exposu...

Read More

POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS

blog article

Oct 22, 2019

It seems like every photo shown of a business in action these days features a bunch of people in a huddle room, looking productive – just like our own Poly beauty shot below. But the technology that is IN the room really matters most to the people who are joining remotely – the people NO...

Read More

Avast target of cyber-security attack, company and Czech counterintelligence say AVAST TARGET OF CYBER-SECURITY ATTACK, COMPANY AND CZECH COUNTERINTELLIGENCE SAY

blog article

Oct 22, 2019

Czech-based Avast and Czech counterintelligence service BIS said on Monday they had detected a network attack on the cyber-security company which the BIS suspected of originating in China. Avast said in a blog post that it found suspicious behaviour on its network on Sept. 23 and opened an investiga...

Read More

Cybersecurity: a crucial issue for industry and transport stakeholders CYBERSECURITY: A CRUCIAL ISSUE FOR INDUSTRY AND TRANSPORT STAKEHOLDERS

blog article

Oct 21, 2019

Cybersecurity is defined as all the technical and non-technical measures of protection that enable an information system to withstand events liable to compromise the availability, integrity, confidentiality or associated proofs (identity, authenticity, traceability) of data stored, processed or tran...

Read More

Scott Schober discusses the state of cybersecurity SCOTT SCHOBER DISCUSSES THE STATE OF CYBERSECURITY

video

Oct 21, 2019

CGTN's Elaine Reyes spoke with Scott Schober, president and CEO of Berkeley Varitronics Systems, discusses U.S. cybersecurity in America, China and around the world, vulnerabilities and its future.

Read More

Former Twitter CISO on IT security hiring and cybersecurity FORMER TWITTER CISO ON IT SECURITY HIRING AND CYBERSECURITY

video

Oct 20, 2019

Michael Coates, CEO and co-founder of Altitude Networks and the former CISO at Twitter, shares best practices for building strong security teams and for starting a career in cybersecurity.

Read More

Alaska Communications Cyber Security Infographic ALASKA COMMUNICATIONS CYBER SECURITY INFOGRAPHIC

infographic

Oct 18, 2019

With cyber criminals becoming more sophisticated than ever, cyber crime remains a serious threat facing businesses of all sizes. Seventy-seven percent of businesses have been victimized by one or more cyber attacks in 2018. Find out what businesses are doing to combat cyber attacks in today’s ...

Read More

Security by Sector: Cyber-Criminals Seek to Exploit Automotive Manufacturing SECURITY BY SECTOR: CYBER-CRIMINALS SEEK TO EXPLOIT AUTOMOTIVE MANUFACTURING

blog article

Oct 18, 2019

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r...

Read More

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software MICROSOFT TO REWARD HACKERS FOR FINDING BUGS IN OPEN SOURCE ELECTION SOFTWARE

blog article

Oct 18, 2019

Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide. Whether it's American voting machines during the 2016 presidential election or India's EVMs during 2014 general elections, the integrity, transparency, and security of electr...

Read More

The Identity Challenge: How Can Banks Know Who’s Who? THE IDENTITY CHALLENGE: HOW CAN BANKS KNOW WHO’S WHO?

blog article

Oct 17, 2019

Technology has transformed the world of banking, bringing all manner of new services to the table and revolutionising the way that customers manage their finances. Gone are the days of fixed branches and localised appointments. Today’s banking is done with the click of a button. However, techn...

Read More

US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns US DOD COMMENTS ON HUAWEI, HIKVISION, DAHUA CYBER SECURITY CONCERNS

video

Oct 16, 2019

Can you talk a little bit about the Department of Defense's concerns about cybersecurity as it relates to the PRC? Last year in the NDAA there was a ban for Huawei, Hikvision, and Dahua. So is the Department of Defense concerned about companies and organizations that might have influence by the ...

Read More

Cryptojacking worm infects exposed Docker deployments CRYPTOJACKING WORM INFECTS EXPOSED DOCKER DEPLOYMENTS

blog article

Oct 16, 2019

Attackers are exploiting Docker Engine deployments that are exposed to the internet without authentication to deploy and run cryptojacking malware on servers. A new cryptojacking botnet with self-spreading capabilities has infected over 2,000 such Docker deployments so far. There have been incidents...

Read More

Cyber-attacks – are you at risk? CYBER-ATTACKS – ARE YOU AT RISK?

video

Oct 16, 2019

Crombie Lockwood Cyber Practice Leader Elizabeth Harbison talks about the emerging risk of cyber-attacks to New Zealand small businesses.

Read More

Maritime Meets Cyber Security MARITIME MEETS CYBER SECURITY

blog article

Oct 16, 2019

As of October 2019, to the best of my knowledge, there has not been a single, dedicated hacking attack against a vessel at sea by malicious actors. While there have been rumors  specifically one from an American telco provider in 2016 that hackers have teamed up with pirates to track high value...

Read More

Critical Success Factors for ABM: Thinking Differently About Data and Reporting CRITICAL SUCCESS FACTORS FOR ABM: THINKING DIFFERENTLY ABOUT DATA AND REPORTING

infographic

Oct 16, 2019

Succeeding with ABM includes taking a broader, more end-to-end approach to measurement. What’s more, successful ABMers move beyond core systems for their planning, executing and reporting. This infographic shows the importance of looking beyond standard reporting methods, adding lead scoring t...

Read More

What’s the answer to the vulnerability overload problem? Key findings from ESG’s Cyber Risk Management survey WHAT’S THE ANSWER TO THE VULNERABILITY OVERLOAD PROBLEM? KEY FINDINGS FROM ESG’S CYBER RISK MANAGEMENT SURVEY

whitepaper

Oct 16, 2019

Cyber risk management is demanding work. Vulnerabilities are growing, threat actors are smarter and pressure from the executive team is intensifying. What used to be a side IT conversation is now a top business priority. You finally have the full attention of the C-suite and board – but, do you know...

Read More

3 Things You Need to Know About Prioritizing Vulnerabilities 3 THINGS YOU NEED TO KNOW ABOUT PRIORITIZING VULNERABILITIES

whitepaper

Oct 16, 2019

With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: Discover the 3 critical steps to buil...

Read More

Cyber Security Stats For Mid-Year 2019 Infographic CYBER SECURITY STATS FOR MID-YEAR 2019 INFOGRAPHIC

infographic

Oct 15, 2019

Cyber Security Hub recently fielded an email survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year. This mid-year checkpoint was a follow-up to the previously fielded survey that took place in November 2018.

Read More

A Look at Deception A LOOK AT DECEPTION

whitepaper

Oct 15, 2019

By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoin...

Read More

FIN7 Gang Returns With New Malicious Tools: Researchers FIN7 GANG RETURNS WITH NEW MALICIOUS TOOLS: RESEARCHERS

blog article

Oct 15, 2019

Despite a major law enforcement crackdown on some of its members in 2018, the FIN7 financial hacking gang has returned with new malicious tools, including a revamped dropper and payload, as part of a new campaign, according to a recent analysis from FireEye. For several years, FIN7 hackers targeted ...

Read More

The top ten password-cracking techniques used by hackers THE TOP TEN PASSWORD-CRACKING TECHNIQUES USED BY HACKERS

blog article

Oct 14, 2019

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you. You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay ...

Read More

What is cybersecurity? WHAT IS CYBERSECURITY?

blog article

Oct 13, 2019

Cybersecurity, or computer security, is the protection of computer systems from the theft or damage to their hardware, software, of electric data, as well as form the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance to computer s...

Read More

Cyber Report: What Is Cyber Security? CYBER REPORT: WHAT IS CYBER SECURITY?

video

Oct 12, 2019

October is National Cyber Security Awareness Month and on this first episode of the Cyber Report, sponsored by Northrop Grumman Cyber & Intelligence Mission Solutions, Matt Jorgenson talks to Defense & Aerospace Report Editor Vago Muradian about what cyber security is and why it matters.

Read More

The C-Suite and Cybersecurity THE C-SUITE AND CYBERSECURITY

video

Oct 11, 2019

Attendees at this year’s WSJ Pro Cybersecurity Executive Summit in London gathered to discuss hot-button issues for cybersecurity. This video looks at how the responsibilities of the C-suite have evolved in response to the increasing importance of cybersecurity.

Read More

Mobile Cybersecurity Tips from Emery Csulak, DOE Chief Information Security Officer MOBILE CYBERSECURITY TIPS FROM EMERY CSULAK, DOE CHIEF INFORMATION SECURITY OFFICER

video

Oct 11, 2019

Our heavy reliance on mobile devices to communicate means we must make mobile cybersecurity a top priority both at home and at work! Learn how DOE is prioritizing mobile cybersecurity by providing tips to stay safe and secure.

Read More

Defense in Depth: User-Centric Security DEFENSE IN DEPTH: USER-CENTRIC SECURITY

blog article

Oct 10, 2019

It’s impossible to create a security system that removes the user from the equation. They are integral and they have to be part of your security program. Security is defined by the individual. The minimum expectation you can have of your users is that they’ll operate in good faith. Avoid...

Read More

McAleenan speaks at cybersecurity event MCALEENAN SPEAKS AT CYBERSECURITY EVENT

video

Oct 10, 2019

FOX News operates the FOX News Channel (FNC), FOX Business Network (FBN), FOX News Radio, FOX News Headlines 24/7, FOXNews.com and the direct-to-consumer streaming service, FOX Nation. FOX News also produces FOX News Sunday on FOX Broadcasting Company and FOX News Edge.

Read More

Hacking Is Not a Crime! Additional Thoughts from DEFCON 2019 HACKING IS NOT A CRIME! ADDITIONAL THOUGHTS FROM DEFCON 2019

blog article

Oct 10, 2019

In my previous post, I spoke about all of the different DEFCON villages where attendees can learn about and purchase all sorts of fun hacking/counter hacking tools. Even so, I covered only a small fraction of the activities at the conference. For example, attendees have the opportunity to participat...

Read More

Cyber-Sicherheit in der Gebaudeautomation (GA) CYBER-SICHERHEIT IN DER GEBAUDEAUTOMATION (GA)

whitepaper

Oct 10, 2019

Die Gebäude, in denen wir leben und arbeiten, werden intelligenter und stärker vernetzt. Aktuell werden die Szenen Realität, die wir bisher nur aus Science-Fiction-Filmen kennen: Durch die steigende Anzahl an IoT-Geräten verwandeln sich unsere Wohnungen und Büros in „intelligente Gebäude”, die selbs...

Read More

Optimale Sicherheit fur ICS-Netzwerke OPTIMALE SICHERHEIT FUR ICS-NETZWERKE

whitepaper

Oct 10, 2019

Unternehmen sind meist nicht mehr konkurrenzfähig, wenn sie Informationstechnologie (IT) und operative Technologien (OT) getrennt betreiben. Aber sie näher zusammenzubringen, führt zu enormer Komplexität bei der eingesetzten Technik. Betriebstechnikleiter waren bisher mit einer steigenden Flut von H...

Read More

The ROI of Retaining Sales Reps THE ROI OF RETAINING SALES REPS

infographic

Oct 10, 2019

The greatest investment your company can make is in its people—specifically sales reps. Unfortunately, most organizations don't see the real impact of their top performers until they leave—and the cost to replace them is often high. This is why, to retaining high-performing sales rep...

Read More

What cyber security training does Falanx Cyber offer? WHAT CYBER SECURITY TRAINING DOES FALANX CYBER OFFER?

video

Oct 09, 2019

Head of security awareness and ethical hacker, Rob Shapland, on what security awareness training services Falanx Cyber offer customers.

Read More

Cybersecurity for Financial Institutions CYBERSECURITY FOR FINANCIAL INSTITUTIONS

video

Oct 09, 2019

As a bank or financial institution, you work with sensitive data every day. You likely have  extensive files with account information, FEIN numbers, financial reports, and more. If you get hacked, each and every one of your customers could be affected. This is an easy way to lose the trust you&...

Read More

Unmask cybercriminals through identity attribution UNMASK CYBERCRIMINALS THROUGH IDENTITY ATTRIBUTION

blog article

Oct 08, 2019

Organized crime has grown more complex since the turn of the century—coinciding with the rise of the digital world, cybercriminals have leveraged the proliferation of technology to broaden their reach with a more sophisticated network-structured model, effectively globalizing their operations ...

Read More

How to Get Involved in Cybersecurity with Lidia Giuliano HOW TO GET INVOLVED IN CYBERSECURITY WITH LIDIA GIULIANO

video

Oct 08, 2019

Lidia Giuliano, Principle Security Consultant at Pulcino Security, shares how she built her career in cybersecurity, how she stays involved, and her biggest piece of advice for those looking to get started in the industry.

Read More

Is Your Enterprise Cyber Risk Managed Well? IS YOUR ENTERPRISE CYBER RISK MANAGED WELL?

blog article

Oct 07, 2019

In this article I want to share with you the secrets to being able to assess whether the enterprise cyber risk in your organization is being managed effectively using a simple set of questions. These are questions that will work even if you are not working in the security function – and I thin...

Read More

How Cloud Computing is Changing Cybersecurity HOW CLOUD COMPUTING IS CHANGING CYBERSECURITY

blog article

Oct 07, 2019

As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do amazing things with web-delivered technologies. However, one of the biggest issues around the cloud has always been, and still is, cybersecurity. (Read The Truth About Cybersecurity.)The clou...

Read More

What every CEO needs to know about Cybersecurity WHAT EVERY CEO NEEDS TO KNOW ABOUT CYBERSECURITY

video

Oct 05, 2019

Mathew Moynahan, CEO of Forcepoint explains what every CEO needs to know about cybersecurity. According to him, external protection isn't enough and it is paramount to empower teams to fight threats. EMIR is the Middle East's most influential corporate intelligence network for CEOs and gover...

Read More

ZTE Cybersecurity White Paper ZTE CYBERSECURITY WHITE PAPER

whitepaper

Oct 04, 2019

The 5G era has been started. Technologies like cloud computing, the Internet of Things (IoT), big data, and AI are gradually booming in the market. These new technologies bring about a new industry revolution together with significant cybersecurity concerns.

Read More

Infographic: Manage Banking Consumers INFOGRAPHIC: MANAGE BANKING CONSUMERS' TOP CYBERSECURITY FEARS

infographic

Oct 04, 2019

CSI and Harris Poll recently surveyed 2,000 Americans nationwide about their opinions and fears surrounding cybersecurity as it pertains to their personal financial data.

Read More

European Cyber Security Month EUROPEAN CYBER SECURITY MONTH

infographic

Oct 04, 2019

A device’s default password is incredibly easy to bypass. It’s basically an open door to your device and all your activity and data. Creating your own personal password is easy and gives you control over what information comes in and goes out.

Read More

I.T. Security Isn’t Just More Important Than Ever It’s The Most Important Thing, Period I.T. SECURITY ISN’T JUST MORE IMPORTANT THAN EVER IT’S THE MOST IMPORTANT THING, PERIOD

whitepaper

Oct 04, 2019

Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield powered by Intel® vPro™ Platform is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays sec...

Read More

4 Steps to Increasing Event ROI with Intent Data 4 STEPS TO INCREASING EVENT ROI WITH INTENT DATA

blog article

Oct 02, 2019

There’s no denying how valuable event marketing can be for any B2B business. Studies have shown that 84% of B2B leaders believe events are critical components of business success. But not all event marketing strategies are created equal. Without the right strategy, events can quickly become a ...

Read More

6 Practical Steps to Build, Execute and Scale Smarter ABM 6 PRACTICAL STEPS TO BUILD, EXECUTE AND SCALE SMARTER ABM

blog article

Oct 02, 2019

It’s hard to argue against the promises of account-based marketing (ABM). Focusing your marketing efforts on ideal accounts that are actively in the market for your products and services seems like a recipe for success in any industry. But the truth is that many ABM programs fail to achieve me...

Read More

Ninth Annual Cost of Cybercrime Study NINTH ANNUAL COST OF CYBERCRIME STUDY

infographic

Oct 02, 2019

The Ninth Annual Cost of Cybercrime study combines research across 11 countries in 16 industries. We interviewed 2,647 senior leaders from 355 companies and drew on the experience and expertise of Accenture Security to examine the economic impact of cyberattacks.

Read More

31 DAYS OF ONLINE SECURITY TIPS 31 DAYS OF ONLINE SECURITY TIPS

infographic

Oct 02, 2019

We’ve written a few articles recently about cybersecurity because we feel this area is often neglected by otherwise security-conscious individuals. Even if you’re not a tech expert who spends most of the day working with computers, the internet has become an inseparable part of our daily...

Read More

Build your career with our Cybersecurity and Technology Risk team BUILD YOUR CAREER WITH OUR CYBERSECURITY AND TECHNOLOGY RISK TEAM

video

Oct 02, 2019

Are you searching for a career in Cybersecurity? GE Aviation is hiring! Our Cybersecurity and Technology Risk team is actively searching for talent to add to our growing team and help protect GE Aviation’s critical assets. Watch here as Senior Executive of Risk & Compliance, Deneen DeFiore...

Read More

Benefits of Using a Managed Services Provider for Cybersecurity BENEFITS OF USING A MANAGED SERVICES PROVIDER FOR CYBERSECURITY

video

Oct 02, 2019

When you talk to business leaders and owners of all sizes there appears to be one key business concern and challenge  cybersecurity and compliance. Threats are arising inside and outside a company’s network, across all industries, making businesses more aware of their exposure to hacking ...

Read More

Prescriptive security for Financial Services PRESCRIPTIVE SECURITY FOR FINANCIAL SERVICES

whitepaper

Oct 01, 2019

This document should be read in conjunction with the Atos publication “Prescriptive Security for Financial Services – Solution Brief” which discusses the commercial drivers for the adoption of prescriptive security services and the professional and IT service options available to f...

Read More

Psap threat modeling white paper PSAP THREAT MODELING WHITE PAPER

whitepaper

Oct 01, 2019

Next Generation 9-1-1 (NG9-1-1) has reshaped the way Public Safety Answering Points (PSAPs) serve their community by providing communication that’s more accurate, integrated and tailor-made for today’s digital and wireless lifestyles. But with these technological advances, NG9-1-1 also i...

Read More

Twilio Whitepaper Security Architecture TWILIO WHITEPAPER SECURITY ARCHITECTURE

whitepaper

Oct 01, 2019

While security is a high priority for all teams, a dedicated Security Team manages Twilio’s security program. The Twilio security framework is based on the ISO 27001 Information Security Standard and includes programs covering: Policies and Procedures, Asset Management, Access Management, Cryp...

Read More

Cyber Security Awareness Month starts today CYBER SECURITY AWARENESS MONTH STARTS TODAY

blog article

Oct 01, 2019

For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year Halloween. However, it’s time not only to prepare for all things spooky. Far from it October is also a month dedicated to a subject that, if ig...

Read More

McAfee Labs 2019 Threats Predictions MCAFEE LABS 2019 THREATS PREDICTIONS

infographic

Sep 30, 2019

Cybercriminals can buy malware, exploits, botnets, and other shady services on the underground market. Criminals of varying experience and sophistication can easily launch attacks. brands will propel more sophisticated cryptocurrency mining and increases in mobile malware and stolen credit cards and...

Read More

Cyber Security and Manufacturing A Briefing for Manufacturers CYBER SECURITY AND MANUFACTURING A BRIEFING FOR MANUFACTURERS

whitepaper

Sep 30, 2019

Manufacturing is a significant target for cyber-criminals. This can result in the theft of sensitive data, industrial espionage for competitive advantage, or the disruption of access to systems or operational technology. 60% of our members tell us they have at some time been subject to a cyber secur...

Read More

Australia’s 2020 Cyber Security Strategy AUSTRALIA’S 2020 CYBER SECURITY STRATEGY

whitepaper

Sep 30, 2019

The internet is an essential part of life for many Australians. We use it to work, stay in touch, access entertainment, pay the bills and manage our finances. At the same time, more of the things around us are connecting online, including our cars, household appliances and industrial machinery. The ...

Read More

New U.N. Debate on Cybersecurity in the Context of International Security NEW U.N. DEBATE ON CYBERSECURITY IN THE CONTEXT OF INTERNATIONAL SECURITY

blog article

Sep 30, 2019

In 2018, the United Nations General Assembly voted to establish two separate groups to study international law and norms in relation to cyberspace. Resolution 73/27—proposed by a number of countries, including Russia—created an open-ended working group (OEWG) on the subject. Another grou...

Read More

Cylance is golden: BlackBerry’s new cybersecurity R&D lab is all about AI and IoT CYLANCE IS GOLDEN: BLACKBERRY’S NEW CYBERSECURITY R&D LAB IS ALL ABOUT AI AND IOT

blog article

Sep 30, 2019

BlackBerry has announced a new business unit dedicated entirely to cybersecurity research and development (R&D).The BlackBerry Advanced Technology Development Labs (BlackBerry Labs) will “operate at the forefront” of cybersecurity R&D, according to BlackBerry. The unit will be sp...

Read More

Digital transformation and cybersecurity (RGB) DIGITAL TRANSFORMATION AND CYBERSECURITY (RGB)

infographic

Sep 29, 2019

As companies embrace technologies such as the Internet of Things, big data, cloud, and mobility, security must be more than an afterthought. But in the digital era, the focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud.

Read More

Microsoft Talks Cyber Security Readiness with Circadence MICROSOFT TALKS CYBER SECURITY READINESS WITH CIRCADENCE

video

Sep 27, 2019

Microsoft's Mark McIntyre interviews Circadence's Keenan Skelly, VP of Global Partnerships and Security Evangelist, on the widening cyber skills gap and how companies can and should shift to a persistent cyber learning and training strategy that prioritizes skill building and cyber competenc...

Read More

Ransomware: Four ways to protect data now RANSOMWARE: FOUR WAYS TO PROTECT DATA NOW

whitepaper

Sep 27, 2019

As the threat of ransomware continues to grow, Citrix provides solutions and best practices to help prevent breaches and to ensure that data remains available in the event that an attack does occur. This white paper explains 4 ways Citrix solutions help kidnap-proof your data: Shield users of web ap...

Read More

Deliver unparalleled remote access with Citrix Workspace DELIVER UNPARALLELED REMOTE ACCESS WITH CITRIX WORKSPACE

whitepaper

Sep 27, 2019

As companies scale, they add solutions leaving employees having with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connec...

Read More

EMA report and buyer’s guide: 10 priorities for enabling secure access to enterprise IT services EMA REPORT AND BUYER’S GUIDE: 10 PRIORITIES FOR ENABLING SECURE ACCESS TO ENTERPRISE IT SERVICES

whitepaper

Sep 27, 2019

For an organization to enable productivity, drive profitability, and meet business objectives, it must make it easy for employees to securely access the IT services they need to get their job done. Trends like mobility and the cloud have complicated matters, but with the right priorities, IT can suc...

Read More

ESG report: Ensuring Business-Centric Device Visibility Across the Extended Enterprise ESG REPORT: ENSURING BUSINESS-CENTRIC DEVICE VISIBILITY ACROSS THE EXTENDED ENTERPRISE

whitepaper

Sep 27, 2019

Digital transformation (DX) priorities support of a variety of business initiatives that can drive business decisions and innovation. Yet many firms struggle to discover, assess and control the devices that enable DX. In this ESG Solution Showcase, Jon Oltsik, senior principal analyst of the Enterpr...

Read More

From Overload to Overlord: Reduce Risks and Take Control of Your ICS Network FROM OVERLOAD TO OVERLORD: REDUCE RISKS AND TAKE CONTROL OF YOUR ICS NETWORK

whitepaper

Sep 27, 2019

Official: organizations can no longer compete effectively while keeping Information Technology (IT) and Operational Technology (OT) separate. Although IT-OT converged ICS networks deliver many business benefits, they also challenge OT managers with new complexities, including the rise of cyber and o...

Read More

5 Network Security Challenges That Have IT Banging Their Head Against A Wall 5 NETWORK SECURITY CHALLENGES THAT HAVE IT BANGING THEIR HEAD AGAINST A WALL

whitepaper

Sep 27, 2019

To say IT professionals, have “challenging” careers would be a vast understatement. Network security specialists today feel like they’re fighting a perpetual battle. In many cases they are understaffed, undertrained and lack support to do the job they are being asked to do. It doesn’t have to be all...

Read More

Protect the Network from the Endpoint with the Critical Security Controls PROTECT THE NETWORK FROM THE ENDPOINT WITH THE CRITICAL SECURITY CONTROLS

whitepaper

Sep 27, 2019

According to the SANS State of Endpoint Security Survey, the endpoint is rapidly evolving and often the first vector of attack into enterprises. It’s no surprise, then, that endpoint security and control are becoming major focal points of SANS security. This whitepaper discusses four Critical Securi...

Read More

SANS: Industrial IoT Security Survey SANS: INDUSTRIAL IOT SECURITY SURVEY

whitepaper

Sep 27, 2019

Everyone who is responsible for Industrial Internet of Things (IIoT) security is working in uncharted territory as there are currently no models or standards that provide adequate guidance for segmenting and safeguarding contemporary systems. And there’s nothing out there that accounts for the borde...

Read More

Implementing the FAIR Model IMPLEMENTING THE FAIR MODEL

whitepaper

Sep 27, 2019

Reporting on cyber risk has become a top priority for the Board of Directors of most large enterprises. Calculating a meaningful risk score and building an effective risk mitigation strategy can be challenging. Can science improve the way we view and quantify cyber risk? Absolutely. The FAIR methodo...

Read More

5 Network Security Challenges That Have IT Banging Their Head Against A Wall 5 NETWORK SECURITY CHALLENGES THAT HAVE IT BANGING THEIR HEAD AGAINST A WALL

whitepaper

Sep 27, 2019

To say IT professionals, have “challenging” careers would be a vast understatement. Network security specialists today feel like they’re fighting a perpetual battle. In many cases they are understaffed, undertrained and lack support to do the job they are being asked to do. It doesn’t have to be all...

Read More

Continuous Visibility, Assessment and CARTA CONTINUOUS VISIBILITY, ASSESSMENT AND CARTA

whitepaper

Sep 27, 2019

Digital transformation represents real progress when it comes to improving business processes of all kinds. However, it has also broadened the environment for advanced threats and opened new opportunities for exploitation. This paper describes how the Forescout visibility platform, with its continuo...

Read More

Assembling cybersecurity: The politics and
materiality of technical malware reports and the case
of Stuxnet ASSEMBLING CYBERSECURITY: THE POLITICS AND MATERIALITY OF TECHNICAL MALWARE REPORTS AND THE CASE OF STUXNET

whitepaper

Sep 26, 2019

This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success...

Read More

ATM & Cyber Security 2019 ATM & CYBER SECURITY 2019

video

Sep 26, 2019

ATM Safe is exhibiting at the ATM & Cyber Security 2019. Our security team welcome all ATM and banking security experts to visit us at booth 9. Visit the world’s leading conference at the Park Plaza Victoria Hotel, London on 8th-9th October 2019.

Read More

 The Power of Peers: A Framework to Promote Social Learning at Work Case Examples by Slack and Udemy THE POWER OF PEERS: A FRAMEWORK TO PROMOTE SOCIAL LEARNING AT WORK CASE EXAMPLES BY SLACK AND UDEMY

whitepaper

Sep 26, 2019

While informal peer-to-peer learning is known to drive 70% of learning at work, how can L&D leaders facilitate this social learning in a more structured way? Download the ebook to walk away with: A 3-stage approach and framework to help you design effective social learning programs at your organizat...

Read More

An Introduction to Data-driven Sales Planning AN INTRODUCTION TO DATA-DRIVEN SALES PLANNING

blog article

Sep 25, 2019

Most organizations still conduct sales planning as a manual, once-per-year exercise, due to the painful and time-consuming nature of the process. Since this is traditionally viewed as a burdensome task, it’s common that once sales plans are set in motion, companies rarely go back to evaluate a...

Read More

The Top B2B Influencer Marketing Trends for 2020 THE TOP B2B INFLUENCER MARKETING TRENDS FOR 2020

infographic

Sep 25, 2019

While there are some who think the expression “influencer” is an expired term, the role of influence on B2B buying decisions is irrefutable. According to the World Federation of Advertisers, 65% of multinational brands will increase their influencer marketing spending within the next 12 ...

Read More

Military Cyber Security: Danish Parliamentary Hearing MILITARY CYBER SECURITY: DANISH PARLIAMENTARY HEARING

video

Sep 25, 2019

On 11 September 2019, the Defence Committee of the Danish Parliament hosted a public hearing on the military aspects of cyber security to help launch my book, Understanding Cybersecurity.

Read More

Cybercrooks Target U.S. Veterans with Fake Hiring Website CYBERCROOKS TARGET U.S. VETERANS WITH FAKE HIRING WEBSITE

blog article

Sep 25, 2019

Researchers are warning that a fake website – purporting to help U.S. military veterans search for jobs  actually links to installers that download malware onto victims’ systems. The website spoofs a legitimate website for U.S. military veterans offered by the U.S. Chamber of Commer...

Read More

The Forrester Wave™: Digital Asset Management for Customer Experience, Q4 2019 THE FORRESTER WAVE™: DIGITAL ASSET MANAGEMENT FOR CUSTOMER EXPERIENCE, Q4 2019

whitepaper

Sep 24, 2019

Forrester Research, Inc. evaluated Aprimo among the 14 most significant DAM providers based on 28 criteria. Aprimo received the highest scores possible in 20 criteria, including Metadata & Taxonomy, Workflow & Approvals, Content Performance Analytics, Scalability, and Product Vision.

Read More

Wait… What? Good News in Cybersecurity? WAIT… WHAT? GOOD NEWS IN CYBERSECURITY?

blog article

Sep 24, 2019

We simply don’t hear enough good news cybersecurity stories that make those involved proud. What are the cybersecurity stories that aren’t being told publicly that should be? Michael Farnum, Set Solutions, said, “If you come into the job and aren’t willing to critically revie...

Read More

The Good for Texas Cybersecurity Tour: Andrew Rodriguez THE GOOD FOR TEXAS CYBERSECURITY TOUR: ANDREW RODRIGUEZ

video

Sep 24, 2019

Student Andrew Rodriguez describes how closely the cybersecurity program at UTSA has aligned with his experience as an intern at our agency. See how higher education programs in Texas are responding to the need for a cybersecurity workforce in Texas.

Read More

Encryption Backdoors What it Means for Machines and Cybersecurity ENCRYPTION BACKDOORS WHAT IT MEANS FOR MACHINES AND CYBERSECURITY

video

Sep 24, 2019

The biggest debate in cybersecurity today - should governments implement encryption backdoors? Venafi's CEO Jeff Hudson explains what this would mean for the security of some of our safest tech - from self-driving cars to nuclear reactors, and all machines that are on the internet. Venafi - inve...

Read More

Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme MALICIOUS AD BLOCKERS FOR CHROME CAUGHT IN AD FRAUD SCHEME

blog article

Sep 24, 2019

‘AdBlock’ and ‘uBlock’ impersonate legitimate extensions but instead engage in cookie stuffing to defraud affiliate marketing programs, a researcher has found. Google has removed two malicious ad blockers from its Chrome Web Store after a researcher discovered they were carry...

Read More

4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION 4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION

blog article

Sep 23, 2019

It is exciting to see how forensics contributes to the investigation of a cyberattack. The application of forensics in the crime scene is what we are aware of but using forensics in digital crime requires a deeper understanding. One common aspect among both is that the evidence must be secured and h...

Read More

Speed Up Your Digital Transformation With The Cloud SPEED UP YOUR DIGITAL TRANSFORMATION WITH THE CLOUD

whitepaper

Sep 23, 2019

In this Content Services in the Cloud Guide by AIIM, we explore how companies are tackling critical document and content management processes such as Accounts Payable, Contract Management and HR Onboarding with the challenges of: Sharing documents securely Automating time-consuming processes Ditchin...

Read More

Cyber Security Stats For Mid-Year 2019 CYBER SECURITY STATS FOR MID-YEAR 2019

infographic

Sep 20, 2019

Cyber Security Hub recently fielded an email survey to subscribers in May 2019 to benchmark what has happened so far in the first six months of the year. This mid-year checkpoint was a follow-up to the previously fielded survey that took place in November 2018.

Read More

Successful Approaches to Using Intent Data – Practical Tips from Priority Engine Users SUCCESSFUL APPROACHES TO USING INTENT DATA – PRACTICAL TIPS FROM PRIORITY ENGINE USERS

blog article

Sep 20, 2019

Increasing sales adoption of Priority Engine, incorporating its data into other systems, and measuring its success are a few key areas in which Priority Engine users commonly seek advice. We recently met with a variety of Priority Engine users and gathered their experiences tackling these common cha...

Read More

The Cyber Risk to Food Processing and Manufacturing THE CYBER RISK TO FOOD PROCESSING AND MANUFACTURING

whitepaper

Sep 20, 2019

Almost every week brings news of a new cybersecurity incident. These typically effect companies
and organizations in the financial, retail, or healthcare industries or, more recently, state and local
governments. They also usually involve data breaches or other attacks that affect info...

Read More

The Cybersecurity Blueprint THE CYBERSECURITY BLUEPRINT

whitepaper

Sep 20, 2019

Cybercrime has grown costlier over the past few years. Ponemon Institute found the average cost of a data breach for businesses was $3.86 million USD per incident1 . Security incidents also affect a large portion of businesses. A study from Thales Security found 70% of their respondents in the Unite...

Read More

Preparing For Physical and Cybersecurity Convergence PREPARING FOR PHYSICAL AND CYBERSECURITY CONVERGENCE

blog article

Sep 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private se...

Read More

What level of AI is right for your DAM? WHAT LEVEL OF AI IS RIGHT FOR YOUR DAM?

blog article

Sep 19, 2019

When you read about the artificial intelligence (AI) capabilities today’s DAM vendors offer, you’ll be faced with a myriad of choices. You’ll find everything from claims of automated, out-of-the-box AI to the ability to ‘train your own AI.’ To help make sense of these c...

Read More

10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ 10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ

blog article

Sep 19, 2019

GCHQ, the Government Communications Headquarters is an intelligence and security agency responsible for keeping the U.K. safe. The team of GCHQ uses cutting-edge technology, technical ingenuity, and wide-ranging partnerships to identify, analyze, and disrupt threats. GCHQ deals with real threats tha...

Read More

5 Tips and Tricks to Boost Small Business Security 5 TIPS AND TRICKS TO BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers.  Many small business owners think they're safe from hackers. After a...

Read More

Protect your information with these cyber security tips PROTECT YOUR INFORMATION WITH THESE CYBER SECURITY TIPS

video

Sep 19, 2019

Miller Insurance Group, Inc. is an independent insurance agent offering Spruce Pine, North Carolina and surrounding areas auto insurance, home insurance, life insurance, and business insurance.

Read More

5 Tips & Tricks That Boost Small Business Security 5 TIPS & TRICKS THAT BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Keep your small business safe from hackers using these cybersecurity tips. Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Ma...

Read More

Cybersecurity for Distributed Energy Resources and SCADA Systems CYBERSECURITY FOR DISTRIBUTED ENERGY RESOURCES AND SCADA SYSTEMS

blog article

Sep 19, 2019

As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability coordinators to maintain a secure supply will be increasingly challenged. This document reviews the v...

Read More

Practical Approaches to High-ROI ABM: Introduction PRACTICAL APPROACHES TO HIGH-ROI ABM: INTRODUCTION

video

Sep 18, 2019

Despite a lot of hype around ABM in the B2B tech sector, some marketers are reluctant to launch ABM programs out of a concern that it’s just too difficult. In this short video, Executive Vice President Bill Crowley recommends a more practical approach: TechTarget’s ABM and purchase inten...

Read More

Spreadsheets vs. Automation: What's Best for Sales Compensation Management? SPREADSHEETS VS. AUTOMATION: WHAT'S BEST FOR SALES COMPENSATION MANAGEMENT?

blog article

Sep 18, 2019

Spreadsheets are the most common tool used to manage data in sales organizations. In fact, more than 75% of companies rely on spreadsheets for their sales planning, forecasting, and sales compensation management. However, the business landscape is growing increasingly competitive—can tradition...

Read More

The 1 Overlooked Loophole In Cyber Security THE 1 OVERLOOKED LOOPHOLE IN CYBER SECURITY

video

Sep 18, 2019

There's an often overlooked cyber security loophole that exists for a lot of your clients. Discover how to get paid to close it now.

Read More

Employee Shortages & Skill Gaps In Cybersecurity EMPLOYEE SHORTAGES & SKILL GAPS IN CYBERSECURITY

video

Sep 18, 2019

In the 2nd part with CEO & founder of STASH Secure Data, Janine Darling, we discuss the current shortages of people within the industry and how skill gaps could provide reasoning for this.

Read More

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond HOW AI CAN CHAMPION CYBERSECURITY IN THE INSURANCE INDUSTRY AND BEYOND

blog article

Sep 18, 2019

Over the last decade, the cybersecurity environment has undergone significant changes. But while the Internet may be vast, it isn’t necessarily becoming safer. Major data leaks from high profile companies like Equifax set a clear message that even big players are vulnerable to security breache...

Read More

AI in cyber security: a necessity or too early to introduce? AI IN CYBER SECURITY: A NECESSITY OR TOO EARLY TO INTRODUCE?

blog article

Sep 18, 2019

There is a list of growing cyber security threats, ranging from a rise in identity thefts and account takeovers to vindictive ransomware strains. Businesses are feeling the strain, especially Fortune 500 enterprises, who have massive stores of data. Because of this, they have become attractive to ba...

Read More

SAP S/4HANA 1809 Product Launch Video with Bert Schulze SAP S/4HANA 1809 PRODUCT LAUNCH VIDEO WITH BERT SCHULZE

video

Sep 18, 2019

Bert Schulze, VP SAP S/4HANA Product Management & Co-Innovation, SAP SE, introduces SAP S/4HANA 1809. In his video, he explains how intelligence is achieved in the latest release, which tools can be used, and the benefits users can take advantage of when using SAP S/4HANA 1809.

Read More

SAP Festival 2019: Innovation Talk by Tom Raftery - People, Planet and Profits SAP FESTIVAL 2019: INNOVATION TALK BY TOM RAFTERY - PEOPLE, PLANET AND PROFITS

video

Sep 18, 2019

Few people have the ability to connect technology, business and people with as much insight and relevance as SAP evangelist Tom Raftery. During his Innovation Talk at the SAP Festival in Brussels, Tom highlighted the impact of new technologies on our personal lives and how enterprises need to be tru...

Read More

Artificial Intelligence and the Future of Jobs ARTIFICIAL INTELLIGENCE AND THE FUTURE OF JOBS

blog article

Sep 18, 2019

My role here at SAP is IoT Evangelist. It’s my job to go around and speak about how the Internet of Things is changing the way we live, work, and run our businesses. IoT Evangelist is a job title that didn’t exist 5 or 10 years ago – mainly because the Internet of Things wasn&rsquo...

Read More

Seven reasons why the Internal Combustion Engine is a dead man walking SEVEN REASONS WHY THE INTERNAL COMBUSTION ENGINE IS A DEAD MAN WALKING

blog article

Sep 18, 2019

The age of the Internal Combustion Engine (ICE) is over. Electric cars are the future. The transition has just begun, but the move from ICE vehicles to Electric will happen sooner and more quickly than most people suspect. What are the factors that lead me to say this with such confidence? However, ...

Read More

How Advanced Attacks are Transforming MSP Endpoint Security HOW ADVANCED ATTACKS ARE TRANSFORMING MSP ENDPOINT SECURITY

infographic

Sep 17, 2019

Most analysts predict managed cyber-security will grow at a CAGR of over 15% in coming years. This trend is no surprise, considering the global shortage of security talent and the increasing sophistication of attacks on data and business productivity. Managed Service Providers (MSPs) are in the best...

Read More

Cyber Crisis: Foundations of Multi-Stakeholder Coordination CYBER CRISIS: FOUNDATIONS OF MULTI-STAKEHOLDER COORDINATION

whitepaper

Sep 17, 2019

In this guide, we lay the foundations for multi-stakeholder coordination during cybersecurity crises that can undermine the security of the digital economy. This guide draws on the diverse international perspectives of CSDE members, as well as their leading practices and realworld actions, to increa...

Read More

Acme Brick builds trust with security framework from IBM ACME BRICK BUILDS TRUST WITH SECURITY FRAMEWORK FROM IBM

video

Sep 17, 2019

Jesse Glaesman, Cyber Security Manager of Acme Brick, explains how his company’s proactive security approach builds trust, insulates customers and protects brand reputation. A longstanding relationship with IBM, including QRadar and X-Force IRIS, ensures Acme Brick can protect the people it se...

Read More

Is AI Worth Your DAM Time? IS AI WORTH YOUR DAM TIME?

blog article

Sep 16, 2019

Tagging based on AI enables assets to be tagged automatically upon ingestion. This smart tagging service creates tags or metadata without human intervention, saving marketers time while reducing the potential for human error. Most importantly, tagging assets or adding metadata to assets using AI imp...

Read More

B2B Marketing Do’s and Don’ts for Attracting Leads B2B MARKETING DO’S AND DON’TS FOR ATTRACTING LEADS

blog article

Sep 16, 2019

For many B2B marketers, attracting and generating leads is often the primary goal. However, how to attract leads varies widely from company to company. While the inbound lead generation strategy should be unique to your firm, there are several best practices or do’s and don’ts for attrac...

Read More

TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019 TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019

blog article

Sep 16, 2019

For any successful business, network systems, data, and their storage account for the most valuable digital assets and that is why such assets pose extreme breach threats causing significant business risk. In this digital age, the dependence of business on these increases their potential vulnerabili...

Read More

How Cybersecurity Can Better Support Digital Transformation Business Goals HOW CYBERSECURITY CAN BETTER SUPPORT DIGITAL TRANSFORMATION BUSINESS GOALS

blog article

Sep 16, 2019

Offering outstanding user experiences and technology interfaces is vital to attracting today’s customers—they demand it. So enterprises leverage ever-growing portfolios of data and systems to differentiate those experiences from their competitors’ offerings, while also strategizing...

Read More

TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020 TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020

blog article

Sep 16, 2019

As the pace of security breaches keeps on expanding, so does the variety of attacks and the advances and procedures set up to counteract them. However, the top threats in the following couple of years will probably be from a kind of hack known to security experts today. Through 2020, 99% of vulnerab...

Read More

5 Ways Field Marketing Can Own ABM 5 WAYS FIELD MARKETING CAN OWN ABM

blog article

Sep 14, 2019

In the last few years, Account-based Marketing has taken over as a better way to engage with modern B2B buyers. When sixty-nine percent of marketers say converting leads is their top priority, a winning ABM strategy requires sound alignment between the sales and marketing functions—and, as the...

Read More

Be aware of Malware BE AWARE OF MALWARE

video

Sep 14, 2019

We’ve all heard of the nasty software that can do serious damage to your computer system – Viruses, Trojans, Worms… and no, we’re not talking about Boggy B and Co. As a group, we call them Malware – AKA “malicious software” – built to exploit chinks i...

Read More

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS

blog article

Sep 14, 2019

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the servic...

Read More

Cybersecurity considerations for electrical distribution systems CYBERSECURITY CONSIDERATIONS FOR ELECTRICAL DISTRIBUTION SYSTEMS

whitepaper

Sep 12, 2019

Every day, cyber attacks against government and commercial computer networks number in the millions. According to U.S. Cyber Command, Pentagon systems are probed 250,000 times per hour. Similar attacks are becoming more prevalent on other kinds of information-based smart networks as well, such as th...

Read More

The Importance of Cybersecurity Whitepaper - Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY WHITEPAPER - THREAT DETECTION FOR UTILITIES

whitepaper

Sep 12, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

5 data privacy and cybersecurity tips for construction firms 5 DATA PRIVACY AND CYBERSECURITY TIPS FOR CONSTRUCTION FIRMS

blog article

Sep 12, 2019

No industry is immune from data privacy and cybersecurity threats, and that includes the construction industry. Here are five data privacy and cybersecurity tips construction firms should consider putting to use to protect themselves against these looming threats. The best way to protect any organiz...

Read More

DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY

infographic

Sep 12, 2019

597 companies in 33 European countries. 80% of leading European businesses say digital transformation is a current strategic priority for their business. with turnovers from less than €30 million to over €300 million. 78% middle market businesses agree that digital transformation is the on...

Read More

Cyber threats and Trends 2019 CYBER THREATS AND TRENDS 2019

whitepaper

Sep 12, 2019

This document is provided in accordance with the terms set forth herein, expressly disclaiming any implied warranties of any kind that may be found to be related. In no event shall the National Cryptologic Centre be held liable for any direct, indirect, incidental or consequential damages arising ou...

Read More

Bigtincan Hub Overview BIGTINCAN HUB OVERVIEW

video

Sep 12, 2019

Bigtincan is the industry's leading Sales Enablement Automation platform, empowering Sales teams to win more and be more productive every day, while providing Marketing the ability to establish ROI on content creation efforts.

Read More

Antivirus Software Overview - Trend Micro Security 2020 ANTIVIRUS SOFTWARE OVERVIEW - TREND MICRO SECURITY 2020

video

Sep 11, 2019

Trend Micro™ Security provides advanced protection and privacy so you can enjoy your digital life safely. It helps protect you from identity theft, in addition to safeguarding against viruses, ransomware, spam, and other malware. Trend Micro Security warns you about dangerous links in email an...

Read More

These Howard County cybersecurity companies formed a biz partnership THESE HOWARD COUNTY CYBERSECURITY COMPANIES FORMED A BIZ PARTNERSHIP

blog article

Sep 11, 2019

Howard County is known for its concentration of cybersecurity companies, and now the proximity is a factor in the formation of a strategic partnership between two of the firms. Through the strategic partnership, Elkridge-based Atlantic Data Forensics (ADF) will use network security tools from Columb...

Read More

Why Companies Are Forming Cybersecurity Alliances WHY COMPANIES ARE FORMING CYBERSECURITY ALLIANCES

blog article

Sep 11, 2019

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha...

Read More

How to Increase Sales Forecasting Accuracy with Automation HOW TO INCREASE SALES FORECASTING ACCURACY WITH AUTOMATION

blog article

Sep 10, 2019

Sales forecasting is the map of estimated sales performance, revenue, and expenses that guide a sales organization in their planning processes. Having an accurate sales forecast is crucial to driving revenue, growth, and profitability. The most successful companies are consistently looking for ways ...

Read More

Is your software vulnerable to cybercrime? IS YOUR SOFTWARE VULNERABLE TO CYBERCRIME?

infographic

Sep 10, 2019

Security patching is essential for securing enterprise software, including Oracle’s. If you can't access the code, you can't develop patches for it. That leaves your software open to attack and your business open to risk. Oracle Support is the best way to legally receive mission critic...

Read More

Cyberthreats throughout the seasons CYBERTHREATS THROUGHOUT THE SEASONS

infographic

Sep 10, 2019

Colds & flu cause staff shortages Simple protection even when IT staff are absent. New beginnings bring new risks Machine learning perfects new detection indicators. Frozen temperatures paralyze IT Cloud-based; immune to extreme weather devastation. March madness despite known risks Message filt...

Read More

Cybersecurity: A governance framework for mobile money providers CYBERSECURITY: A GOVERNANCE FRAMEWORK FOR MOBILE MONEY PROVIDERS

whitepaper

Sep 10, 2019

The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with nearly 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent indust...

Read More

Implementing Buyer Enablement in Your Sales Enablement Strategy (2019) IMPLEMENTING BUYER ENABLEMENT IN YOUR SALES ENABLEMENT STRATEGY (2019)

blog article

Sep 10, 2019

The majority of the time I only had access to two TV channels, three on a good weather day, and I vividly remember when I first saw a color television. At this time, products and services were limited, and buyer choices were almost non-existent. Fast-forward to 2019. Not only do I have access to hun...

Read More

The Role of Sales in Sales Enablement THE ROLE OF SALES IN SALES ENABLEMENT

blog article

Sep 10, 2019

However, with a regular commute time that consumes a couple of hours each day, I have shifted my focus to podcasts and audiobooks. One of my favorite podcasts is the Inside Sales Enablement series by Scott Santucci and Brian Lambert. In their last episode, they spent time reviewing their thoughts an...

Read More

Defending the Philippines in Cyberspace DEFENDING THE PHILIPPINES IN CYBERSPACE

video

Sep 09, 2019

On 29th August 2019, the Teh Group organised the Cyber Attack Manila 2019 at Shangri-la Makati with 400 cyber security professionals from various industries including government and law enforcement.  The event covered themes in cyber security, threat intelligence, cyber investigation... just to...

Read More

Cybersecurity progress this way finally comes CYBERSECURITY PROGRESS THIS WAY FINALLY COMES

blog article

Sep 09, 2019

Given all the high-profile cybersecurity attacks making headlines these days, it’s easy to conclude that organizations are still not making cybersecurity a high enough priority. However, a survey of 867 senior executives conducted by Infosys representing 847 firms from 12 industries, with annu...

Read More

Malware Attack Prompts School District Closure: K-12 Cyber Disruptions Rising MALWARE ATTACK PROMPTS SCHOOL DISTRICT CLOSURE: K-12 CYBER DISRUPTIONS RISING

blog article

Sep 09, 2019

The Flagstaff Unified School District in Arizona is just the latest to fall victm to a cybersecurity attack so disruptive it forced schools to close Thursday and Friday of last week. Schools were back in session on Monday, after the district's team worked "round the clock securing systems a...

Read More

SMBs cite security, backup & recovery as top business concerns SMBS CITE SECURITY, BACKUP & RECOVERY AS TOP BUSINESS CONCERNS

blog article

Sep 09, 2019

Small businesses around the world acknowledge that cybersecurity, backup and data recovery are important aspects of their business, but most of those businesses sit between the two lowest levels of IT maturity. The lack of maturity reflects an ongoing problem that small businesses face – the n...

Read More

4 steps to address the cybersecurity skills shortage 4 STEPS TO ADDRESS THE CYBERSECURITY SKILLS SHORTAGE

blog article

Sep 09, 2019

University of Waikato’s Cybersecurity Researchers of Waikato (CROW), receives weekly requests from companies to see if personnel or students would be interested in applying for a role or an internship in cybersecurity. The government’s strategy notes that 3,445 cybersecurity incidents we...

Read More

Laptop Security: Scariest thing for enterprise owner LAPTOP SECURITY: SCARIEST THING FOR ENTERPRISE OWNER

video

Sep 08, 2019

Presenting BLACKbox duo, class leading data isolation technology protecting enterprise data from leakage or theft from laptops through USB, Email Attachment, BCC and Internet.

Read More

Leitfaden für Führungskräfte: Nutzung von SAP auf Azure für Ihre IT- Transformation Ein kostenloses Whitepaper zur SAP-Bereitstellung in der Cloud LEITFADEN FÜR FÜHRUNGSKRÄFTE: NUTZUNG VON SAP AUF AZURE FÜR IHRE IT- TRANSFORMATION EIN KOSTENLOSES WHITEPAPER ZUR SAP-BEREITSTELLUNG IN DER CLOUD

whitepaper

Sep 06, 2019

Veröffentlicht: 18.01.2019 Die heutige IT-Umgebung erfordert Flexibilität und Agilität. Herkömmliche Ansätze für die Bereitstellung von SAP-Anwendungen können Sie bei der Umsetzung ihres ganzen Potenzials einschränken. Halten Sie Ihre IT durch eine neue Generation an SAP-Einsatzmöglichkeiten auf Mic...

Read More

 Der Total Economic Impact™ von Microsoft Azure für SAP – eine Auftragsstudie von Forrester Consulting DER TOTAL ECONOMIC IMPACT™ VON MICROSOFT AZURE FÜR SAP – EINE AUFTRAGSSTUDIE VON FORRESTER CONSULTING

whitepaper

Sep 06, 2019

Veröffentlicht: 12.04.2019 Erfahren Sie, was Ihnen die Cloudmigration von SAP-Workloads mit Microsoft Azure an Kostenersparnissen und Geschäftsvorteilen bringt. Diese Studie von Forrester Consulting, die von Microsoft in Auftrag gegeben wurde, umfasst eine ausführliche Analyse der Rendite und andere...

Read More

Industrial Cybersecurity: A Proactive Approach Video INDUSTRIAL CYBERSECURITY: A PROACTIVE APPROACH VIDEO

video

Sep 05, 2019

The Industrial Internet of Things is driving a level of increased connectivity that helps companies to improve their overall performance, but also comes with the potential for enterprise risk.  With the potential for huge losses at stake, applying cyber security to industrial control systems me...

Read More

What will 5G mean for business cybersecurity? WHAT WILL 5G MEAN FOR BUSINESS CYBERSECURITY?

blog article

Sep 05, 2019

The coming switch to 5G cellular networks will be a boon to businesses in many ways, but it will also create a vast new “attack surface” for hackers. The main attraction to 5G — “lightning-fast” internet speeds — is also what creates the risk. Why? Because it will...

Read More

3 communication skills all cybersecurity pros should have 3 COMMUNICATION SKILLS ALL CYBERSECURITY PROS SHOULD HAVE

video

Sep 04, 2019

Cheryl Kerrigan, Vice President of People at BlueCat, discusses three communication skills that cybersecurity professionals need to be successful. At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers w...

Read More

Why Artificial Intelligence Will Save Cybersecurity? WHY ARTIFICIAL INTELLIGENCE WILL SAVE CYBERSECURITY?

blog article

Sep 04, 2019

Cybersecurity is in a dire state. Massive breaches are commonplace. A few years ago, 70 million Target customers were affected by a large-scale cyber attack. Target’s CIO was immediately let go in the wake of such an unthinkable disaster. Breaches are affecting more and more citizens. Now 70 m...

Read More

Gartner names Trend Micro leader in endpoint protection platforms GARTNER NAMES TREND MICRO LEADER IN ENDPOINT PROTECTION PLATFORMS

blog article

Sep 03, 2019

Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend Micro has been named a Leader in every Gartner Magic Quadrant for this categ...

Read More

What is Cryptocurrency Mining Malware? WHAT IS CRYPTOCURRENCY MINING MALWARE?

blog article

Sep 02, 2019

Before we get into the details of “Cryptocurrency Mining Malware”, we need to understand first what cryptocurrency is and what miners are. What is Cryptocurrency? Cryptocurrency is best thought of as digital currency  and it only exists on computers. It is transferred between peers ...

Read More

This Has Been the Worst Year for iPhone Security Yet THIS HAS BEEN THE WORST YEAR FOR IPHONE SECURITY YET

blog article

Sep 02, 2019

Earlier this month, in a dimly lit conference room in a swanky Las Vegas conference center, an Apple employee walked up on stage to pick up an award. The ceremony was the Pwnie Awards, a largely tongue in cheek affair that celebrates the best—and in other ways the worst—hacks of the year...

Read More

5 manières de soutenir l’engagement et la productivité de vos employés 5 MANIÈRES DE SOUTENIR L’ENGAGEMENT ET LA PRODUCTIVITÉ DE VOS EMPLOYÉS

whitepaper

Aug 30, 2019

Donner aux employés les bons outils pour travailler de façon optimale peut être difficile dans le monde actuel, en raison de la diversification des appareils et des styles de travail. Cet e-book révèle comment choisir la technologie appropriée pour vos employés : Protégez les données de l’entreprise...

Read More

Seize the power of the cloud: 7 reasons to switch to Microsoft 365 SEIZE THE POWER OF THE CLOUD: 7 REASONS TO SWITCH TO MICROSOFT 365

whitepaper

Aug 30, 2019

Is your on-premises technology holding you back? While you may feel that you have more control over your on-prem solutions, they might be limiting your employees’ ability to collaborate from anywhere using secure apps they already know and love. In this e-book, you’ll see seven ways that Microsoft 3...

Read More

Artificial Intelligence – Helping Cyber Security ARTIFICIAL INTELLIGENCE – HELPING CYBER SECURITY

blog article

Aug 29, 2019

Artificial Intelligence (AI)  is now playing a significant role in helping to managing cyber risk. This was recently evident in the aftermath of the Nordsk Hydro ransomware attack where AI was utilised to identify further vulnerabilities. This form of automative technology would seem to be a go...

Read More

McAfee Labs Threats Report August 2019 MCAFEE LABS THREATS REPORT AUGUST 2019

whitepaper

Aug 29, 2019

Welcome to the McAfee Labs Threats Report, August 2019. In this edition, we highlight the significant investigative research and trends in threats statistics and observations in the evolving threat landscape gathered by the McAfee® Advanced Threat Research and McAfee® Labs teams in Q1 of 201...

Read More

Why must the public sector take a security by design approach? WHY MUST THE PUBLIC SECTOR TAKE A SECURITY BY DESIGN APPROACH?

blog article

Aug 29, 2019

Cyber security is a high-profile issue for UK public sector bodies, as recent news shows. Iain Shearman, Managing Director of KCOM’s National Network Services, looks at why the public sector needs to adopt security by design. It seems that nearly every week there’s some news about how UK...

Read More

Why the New Madison Logic Oracle Eloqua Integration is so Exciting for Marketers WHY THE NEW MADISON LOGIC ORACLE ELOQUA INTEGRATION IS SO EXCITING FOR MARKETERS

video

Aug 29, 2019

Madison Logic is excited to announce a bi-directional integration with Oracle Eloqua, combining best-in-class lead and campaign management skills with Madison Logic’s global reach and advanced targeting. Now Oracle Marketing Automation users are able to align their messaging and targeting thro...

Read More

Two In Three Organizations To Deploy AI In Their Cyber Security System By 2020 TWO IN THREE ORGANIZATIONS TO DEPLOY AI IN THEIR CYBER SECURITY SYSTEM BY 2020

blog article

Aug 29, 2019

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, according to Capgemini Research Institute’s Reinventing Cybersecurity with Artificial Intelligence: The New Frontier in Digital Security study. Two thirds (69%) of organization...

Read More

A new approach to data protection is here A NEW APPROACH TO DATA PROTECTION IS HERE

whitepaper

Aug 29, 2019

To counter modern data security threats, you need to think counterintuitively. Data guardrails and behavioral analytics are new approaches to protecting your data against modern threats — without handcuffing your employees access to the data they need. Download this new Securosis executive summary, ...

Read More

PHISHING ATTACKS ON BIG COMPANIES PHISHING ATTACKS ON BIG COMPANIES

infographic

Aug 28, 2019

Phishing scams are almost always emails that appear to be from a legitimate business that needs your urgent attention on some matter. From there, scammers will try to get you to click on their spoofed, fake and malicious links and steal your credentials. One-click is all these criminals need to gain...

Read More

An effective Cyber-Attack defense solution for your Healthcare or Industrial Neighborhood AN EFFECTIVE CYBER-ATTACK DEFENSE SOLUTION FOR YOUR HEALTHCARE OR INDUSTRIAL NEIGHBORHOOD

video

Aug 28, 2019

In today’s day and age, hackers are getting more sophisticated and are targeting sensitive, potentially vulnerable, and sophisticated targets like Healthcare and Industrial networks. Xilinx Healthcare & Industrial IoT solutions and Zynq UltraScale+ System-on-Chip (SoC) platform provides th...

Read More

Malware Analysis Bootcamp - Examining The Resources Section MALWARE ANALYSIS BOOTCAMP - EXAMINING THE RESOURCES SECTION

video

Aug 28, 2019

Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will be analyzing the resources section. Our objective is to find any additional malicious files or binaries that have been included by the a...

Read More

Why testing user behaviour is crucial to your cyber security WHY TESTING USER BEHAVIOUR IS CRUCIAL TO YOUR CYBER SECURITY

blog article

Aug 28, 2019

Cyberattacks and security breaches have become so widespread that companies are now spending billions of dollars collectively to deal with these threats. Falling victim to attacks such as an advanced persistent threat or a malware attack can cause irreparable damage to their businesses and reputatio...

Read More

A New Tool For Hackers – AI in Cybersecurity A NEW TOOL FOR HACKERS – AI IN CYBERSECURITY

blog article

Aug 28, 2019

The dawn of the internet and advances in computing means we’re able to trigger an exact solution to complex problems in diverse areas - ranging from astrophysics and biological systems to automation and precision. But at the same time, these systems are inherently vulnerable to cyber threats. ...

Read More

Can We Create Future-Proof Organisations by Understanding Today’s Processes? CAN WE CREATE FUTURE-PROOF ORGANISATIONS BY UNDERSTANDING TODAY’S PROCESSES?

whitepaper

Aug 28, 2019

This exclusive IDC InfoBrief examines how the latest disruptive technologies are fueling a revolution in digital transformation. Discover how new technologies can help you reshape how your business functions to reach higher efficiency, productivity and security and sharpen your competitive edge: Clo...

Read More

MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP

infographic

Aug 27, 2019

This IDC Infographic is a snapshot of the results of an Asia/Pacific banking survey to better understand where the cybersecurity gaps and opportunities are for banks to create a more business-focused security strategy. KEY HIGHLIGHTS.

Read More

Security in the era of Industry 4.0 SECURITY IN THE ERA OF INDUSTRY 4.0

whitepaper

Aug 27, 2019

What is commonly referred to as Industry 4.0 is being driven by increased interconnectivity and digitization of production technologies and processes. The possibilities emerging for manufacturers to connect people, machines, factories and digital workspaces are endless. This Industry 4.0 transformat...

Read More

Malware and ransomware protection MALWARE AND RANSOMWARE PROTECTION

video

Aug 27, 2019

You've most likely heard about cyber-attacks and malicious emails but how do malware and ransomware work? This video has valuable information about how an attack gets in and infects your IT system - before potentially damaging your business. It also gives advice on how to prevent attacks using a...

Read More

Can VMware become a leading cybersecurity vendor? CAN VMWARE BECOME A LEADING CYBERSECURITY VENDOR?

blog article

Aug 27, 2019

When you think about VMware and cybersecurity, two products have always stood out. NSX, which has evolved into a common micro-segmentation tool for east/west traffic within ESXi, and AppDefense, which monitors applications, determines “normal” behavior, and detects anomalies. Now, VMware...

Read More

How AI Is Changing The Cyber-Security Landscape HOW AI IS CHANGING THE CYBER-SECURITY LANDSCAPE

blog article

Aug 27, 2019

The use of Artificial Intelligence (AI) has enhanced not only the delivery of services but also improved cybersecurity. It’s estimated that 15% of organizations globally have adopted AI technology in their operations. However, the use of technology has both positive and negative consequences f...

Read More

David Spark is the Ira Glass of the Cybersecurity Industry DAVID SPARK IS THE IRA GLASS OF THE CYBERSECURITY INDUSTRY

video

Aug 26, 2019

Take a few minutes with us as our Man on the Street Matt Stephenson checks in with Cybersecurity Media legend David Spark. We catch up on what David has been up to with his podcast series CISO/Vendor Relationship and Defense in Depth.

Read More

How To Protect Your PC Against Ransomware Easy and Total Free HOW TO PROTECT YOUR PC AGAINST RANSOMWARE EASY AND TOTAL FREE

video

Aug 26, 2019

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to an individual or an organization....

Read More

Ransomware threat raises National Guard RANSOMWARE THREAT RAISES NATIONAL GUARD'S ROLE IN STATE CYBERSECURITY

blog article

Aug 26, 2019

National Guard units already play a large role in state governments’ cybersecurity activities, such as protecting election systems, but the threat of ransomware to cripple a state or city organization is a growing concern for uniformed personnel, the top military official overseeing the Nation...

Read More

CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY? CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY?

blog article

Aug 26, 2019

As the new-age technologies have disrupted the IT industry, several trending topics grab the attention regularly. The automation of mundane and repetitive tasks has become an essential dose for progressive companies. It releases the workforce from such task and directs them towards more creative wor...

Read More

Finding an Access Solution for Your Business: A Guide to Evaluating and Comparing Options: FINDING AN ACCESS SOLUTION FOR YOUR BUSINESS: A GUIDE TO EVALUATING AND COMPARING OPTIONS:

whitepaper

Aug 26, 2019

So, you’ve decided your business could benefit from an access solution. Now what? Finding the right option means understanding your needs as well as what you expect an access solution to do for you, and then finding the product that best delivers on those needs and expectations. To help, we’ve craft...

Read More

Identity 101 for SMBs: A Guide to the Benefits and Features of Identity Solutions: IDENTITY 101 FOR SMBS: A GUIDE TO THE BENEFITS AND FEATURES OF IDENTITY SOLUTIONS:

whitepaper

Aug 26, 2019

Learn why Identity matters, what an Identity solution is, and how an Identity solution can help your business. How can an Identity solution help your business be more secure -- and productive? Today’s business environment is anything but simple – and increased cyber threats just complicate things mo...

Read More

The SMBs Guide to Modern Identity: Bridging the Gap from Passwords to Identity: THE SMBS GUIDE TO MODERN IDENTITY: BRIDGING THE GAP FROM PASSWORDS TO IDENTITY:

whitepaper

Aug 26, 2019

The data is in: 93% of SMBs agree a unified identity solution would greatly benefit the overall security of their organization. LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity for small and medium businesses (SMBs). We surveyed 700 IT and sec...

Read More

Identity 101 for SMBs: A Guide to the Benefits and Features of Identity Solutions: IDENTITY 101 FOR SMBS: A GUIDE TO THE BENEFITS AND FEATURES OF IDENTITY SOLUTIONS:

whitepaper

Aug 26, 2019

Learn why Identity matters, what an Identity solution is, and how an Identity solution can help your business. How can an Identity solution help your business be more secure -- and productive? Today’s business environment is anything but simple – and increased cyber threats just complicate things mo...

Read More

Finding an Access Solution for Your Business: A Guide to Evaluating and Comparing Options: FINDING AN ACCESS SOLUTION FOR YOUR BUSINESS: A GUIDE TO EVALUATING AND COMPARING OPTIONS:

whitepaper

Aug 26, 2019

So, you’ve decided your business could benefit from an access solution. Now what? Finding the right option means understanding your needs as well as what you expect an access solution to do for you, and then finding the product that best delivers on those needs and expectations. To help, we’ve craft...

Read More

The SMBs Guide to Modern Identity: Bridging the Gap from Passwords to Identity: THE SMBS GUIDE TO MODERN IDENTITY: BRIDGING THE GAP FROM PASSWORDS TO IDENTITY:

whitepaper

Aug 26, 2019

The data is in: 93% of SMBs agree a unified identity solution would greatly benefit the overall security of their organization. LastPass commissioned the market research firm Vanson Bourne to offer insights into the state of identity for small and medium businesses (SMBs). We surveyed 700 IT and sec...

Read More

A Clear Business Reason For Why Cyber Security Is So Important A CLEAR BUSINESS REASON FOR WHY CYBER SECURITY IS SO IMPORTANT

video

Aug 25, 2019

As a vendor of products and services to your clients, you are part of their supply chain. More and more companies are insisting on visibility into the cyber security of their suppliers. Larger companies are demanding to see that the companies they deal with are able to demonstrate that they're a...

Read More

What Is a Zero-Trust Model in Cybersecurity, and What Does It Mean for Federal IT? WHAT IS A ZERO-TRUST MODEL IN CYBERSECURITY, AND WHAT DOES IT MEAN FOR FEDERAL IT?

blog article

Aug 23, 2019

Cybersecurity is a perennial concern inside federal agencies, but the conversation is starting to evolve. In the past, perimeter-based IT security defenses were a major area of investment — keeping malicious actors out of networks and away from sensitive data. Increasingly, the cybersecurity l...

Read More

What’s the Difference Between Antivirus and Endpoint Security? WHAT’S THE DIFFERENCE BETWEEN ANTIVIRUS AND ENDPOINT SECURITY?

blog article

Aug 22, 2019

What’s the difference between antivirus and endpoint security? Why should your enterprise case? How should it affect your enterprise cybersecurity solution decisions? Indeed, the difference between antivirus and endpoint security looks almost indistinguishable from a distance. In fact, antivir...

Read More

Malwarebytes founder and CEO talks the company MALWAREBYTES FOUNDER AND CEO TALKS THE COMPANY'S ORIGIN STORY

video

Aug 22, 2019

Marcin Kleczynski tells the story behind how he and a small band of malware hunters have worked together to build cybersecurity software that can take on the threats traditional antivirus can't handle.

Read More

Why Behavioral Analytics Matter to Enterprise Cybersecurity WHY BEHAVIORAL ANALYTICS MATTER TO ENTERPRISE CYBERSECURITY

blog article

Aug 22, 2019

Why do behavioral analytics matter so much for your enterprise’s cybersecurity? In fact, what even are behavioral analytics? Which threats can it detect most easily? Why do those threats pose the most danger to your business? Your enterprise network continues to scale as more users connect to ...

Read More

The Impact of Artificial Intelligence on Cyber Security THE IMPACT OF ARTIFICIAL INTELLIGENCE ON CYBER SECURITY

blog article

Aug 22, 2019

There is currently a big debate raging about whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life. With more and more enterprises using AI for their needs, it’s time to analyze the possible impacts of the implementation of AI in the cyber security fi...

Read More

Anatomy of Today’s Global Traveler ANATOMY OF TODAY’S GLOBAL TRAVELER

infographic

Aug 22, 2019

Where does the modern traveler come from? Where is s/he going? How does s/he get there? As the world grows ever-smaller, more and more people are traveling to a growing number of places each year. Increasingly, they’re getting there by leveraging digital tools. Savvy travel and hospitality bra...

Read More

ESET Cybersecurity tips & tricks: UEFI scanning ESET CYBERSECURITY TIPS & TRICKS: UEFI SCANNING

video

Aug 21, 2019

Everyone is familiar with the concept that attackers can launch malicious attacks through email, Windows or other software that runs on our laptops. But can the device itself become the target? Like many other parts of a computer system, UEFI can be attacked to gain unauthorized access to the system...

Read More

CyberRisk Alliance acquires Cybersecurity Collaborative CYBERRISK ALLIANCE ACQUIRES CYBERSECURITY COLLABORATIVE

blog article

Aug 21, 2019

Cybersecurity and business intelligence company CyberRisk Alliance recently acquired Cybersecurity Collaborative, a peer council platform for Chief Information Security Officers (CISOs). Cybersecurity Collaborative is a private cross-industry forum for CISOs and security professionals devoted to pee...

Read More

Creating Content That Improves CX: A Q&A with Lionbridge & Aprimo CREATING CONTENT THAT IMPROVES CX: A Q&A WITH LIONBRIDGE & APRIMO

blog article

Aug 21, 2019

Today’s brands face numerous challenges. They need to create a customized, excellent experience for each and every customer worldwide. To do that, they need to create high-quality, on-target content. They need to create that content quickly, effectively, and for audiences who speak multiple la...

Read More

Lionbridge Brand Video LIONBRIDGE BRAND VIDEO

video

Aug 21, 2019

Our roots began in translation but what we do today goes well beyond – from content creation to linguistics, to artificial intelligence (AI). We create global relevance, driven by humanity and amplified by technology. Connecting our customers with their communities and driving brand awareness....

Read More

Artificial Intelligence: A Tool or a Threat to Cybersecurity? ARTIFICIAL INTELLIGENCE: A TOOL OR A THREAT TO CYBERSECURITY?

blog article

Aug 21, 2019

Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsic value to both businesses and consumers. Since business operations have become smarter with technology, so ...

Read More

A BUYER’S GUIDE FOR LOCALIZATION SERVICES: A BUYER’S GUIDE FOR LOCALIZATION SERVICES:

whitepaper

Aug 21, 2019

Your localization partner is going to do a deep-dive into your business—so start by diving deep into theirs. Are they an industry-leader with 20 years of experience or a relative newcomer? Will they speak Samoan, Uzbek, or Swahili (and all your customers’ languages)? Can they deliver on-...

Read More

WHY AI? HOW LANGUAGE & AI SERVICES GO HAND-IN-HAND WHY AI? HOW LANGUAGE & AI SERVICES GO HAND-IN-HAND

whitepaper

Aug 21, 2019

In practice, of course, things are more complicated. Effective translation necessitates a nuanced understanding of (at least) two languages and cultures, both source and target. It requires an understanding of the original content’s goals. It mandates a fluency in tone and subtext as well as v...

Read More

Going Global 101: How Your Competition Can Be Your Best Resource GOING GLOBAL 101: HOW YOUR COMPETITION CAN BE YOUR BEST RESOURCE

blog article

Aug 20, 2019

Lace-up your sneakers and step up to the starting line: you’re ready to reach countless customers in new markets.  You’ve secured your spot in the Global Marketplace (whether by default or design).  But before you sprint away, take a good look around you. You are not alone in t...

Read More

THE STATE OF FINANCIAL PHISHING 2019 H1 THE STATE OF FINANCIAL PHISHING 2019 H1

infographic

Aug 20, 2019

Phishing attacks always start with a scheme to trick consumers into thinking they are doing business with a company or organization that they already trust. Hackers create websites that impersonate financial institutions and then steal sensitive information such as credit card and banking data that ...

Read More

The future of cybersecurity and data THE FUTURE OF CYBERSECURITY AND DATA

video

Aug 20, 2019

Listen to Dr. Charla Griffey-Brown, professor of information systems and technology management at Pepperdine School of Business, talk about cybersecurity. What should leaders be thinking about when looking at their enterprise infrastructure?

Read More

Microsoft® Tightens Partner Network Security Requirements with MFA MICROSOFT® TIGHTENS PARTNER NETWORK SECURITY REQUIREMENTS WITH MFA

blog article

Aug 20, 2019

In the last few months, Microsoft® has been ruffling their Partners’ feathers by proposing a series of startling changes to their Partner Network. Following a failed attempt to cut internal use rights (IUR) support for smaller MSPs, Microsoft has recently tightened restrictions on their Pa...

Read More

Three Common Email Security Mistakes That MSPs Make THREE COMMON EMAIL SECURITY MISTAKES THAT MSPS MAKE

blog article

Aug 20, 2019

MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes. Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they as...

Read More

Combating Cybersecurity Challenges with Advanced Analytics COMBATING CYBERSECURITY CHALLENGES WITH ADVANCED ANALYTICS

whitepaper

Aug 19, 2019

Cyber crimes and security threats have grown at an exponential rate in recent years, and the momentum is only growing. According to Juniper Research, over 146 billion records will be exposed through criminal data breaches from 2018 to 2023, growing at a rate of 22.5% per year.1 This builds on the as...

Read More

Simplifying IoT and IoMT Security for Healthcare SIMPLIFYING IOT AND IOMT SECURITY FOR HEALTHCARE

video

Aug 19, 2019

Medigate has integrated their cybersecurity platform with Palo Alto Networks Next Generation Firewalls to improve security of clinical networks and simplify the management of connected medical devices.

Read More

What can we do about public-sector security breaches? WHAT CAN WE DO ABOUT PUBLIC-SECTOR SECURITY BREACHES?

blog article

Aug 19, 2019

Just as the sun comes up every morning, cybercriminals continually change their tactics to counter the latest defenses. This tactic was highlighted in the annual Verizon Data Breach Investigations Report, which described the changing face of cybersecurity threats. For public-sector organizations, on...

Read More

Why cybersecurity is a central ingredient in evolving digital business models WHY CYBERSECURITY IS A CENTRAL INGREDIENT IN EVOLVING DIGITAL BUSINESS MODELS

blog article

Aug 19, 2019

About the only thing shifting as fast as the cyber threat landscape is the typical enterprise’s org chart. As enterprises aim to keep pace with the rapidly evolving digital economy, many are restructuring internal departments, hiring criteria and the processes by which they develop and distrib...

Read More

Malware Analysis Checking out a User-land Rootkit MALWARE ANALYSIS CHECKING OUT A USER-LAND ROOTKIT

video

Aug 18, 2019

During my malware analysis stream, I decided to take a look at an old coin mining sample I caught a few months ago that created a "fake" rootkit by manipulating the user's path. In this video, we take a look at how this userspace rootkit works, and the effects that the rootkit has.

Read More

Role of Artificial Intelligence in Data Security ROLE OF ARTIFICIAL INTELLIGENCE IN DATA SECURITY

blog article

Aug 18, 2019

Just the way the deficiency of vitamin and poor hygiene can make the human body fell seriously ill, the deficient access points and lack of hygiene in cyber environments can lead to cyberattacks in the hyper-connected workplaces. The likelihood of cyberattacks is increasing with continuous balloonin...

Read More

Rebuilding Your Brand’s Reputation After A Cyber Attack REBUILDING YOUR BRAND’S REPUTATION AFTER A CYBER ATTACK

blog article

Aug 18, 2019

It is estimated that one cyber attack occurs every 39 seconds, with millions of records being stolen daily. According to IT Governance USA, some of the most common attacks include malware, phishing, distributed denial-of-service attacks, SQL injection, and ‘man-in-the-middle’ (MITM). Tak...

Read More

How to Fight a Ransomware Attack HOW TO FIGHT A RANSOMWARE ATTACK

infographic

Aug 15, 2019

The age of computers has brought us numerous benefits that have made our daily lives much more bearable and enjoyable. This rings especially true in office spaces, where computers are vital to ensure seamless day-to-day operations. However, like in the real world, there are opportunists that take th...

Read More

How to mitigate digital risks & Cyber Threats on social media HOW TO MITIGATE DIGITAL RISKS & CYBER THREATS ON SOCIAL MEDIA

whitepaper

Aug 15, 2019

From local corner shops to global organizations, social media has had a transformative effect on marketing, customer service, knowledge-sharing, and even recruitment and hiring. Companies need social media to maintain their visibility and build closer relationships with their customers. However, the...

Read More

Enterprise Security With Threat Monitoring - SolarWinds Lab ENTERPRISE SECURITY WITH THREAT MONITORING - SOLARWINDS LAB

video

Aug 15, 2019

Security Content Architect, Destiny Bertucci and Head Geek™, Thomas LaRock, share their knowledge of SolarWinds® Security Event Manager (formerly Log & Event Manager), as well as Threat Monitor. They outline the architecture design for both tools, walk through demos of each, and discus...

Read More

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope BLACK HAT 2019: 3 CYBERSECURITY CONCERNS AND 3 THINGS THAT GIVE HOPE

blog article

Aug 15, 2019

Organizations worry more about the volume and sophistication of cyber attacks and are confused about what tools to use. It's not all bad news, though, as this year's Black Hat highlighted several security advancements, including greater emphasis on application security and automating securit...

Read More

US Cyber Command has publicly posted malware linked to a North Korea hacking group US CYBER COMMAND HAS PUBLICLY POSTED MALWARE LINKED TO A NORTH KOREA HACKING GROUP

blog article

Aug 15, 2019

U.S. Cyber Command, the sister division of the National Security Agency focused on offensive hacking and security operations, has released a set of new samples of malware linked to North Korean hackers. The military unit tweeted Wednesday that it had uploaded the malware to VirusTotal, a widely used...

Read More

2020 Content Marketing Spectrum 2020 CONTENT MARKETING SPECTRUM

video

Aug 14, 2019

This is a video explainer of the difference between Content Marketing, Branded Content and Native Advertising - with examples to help put it all into context.Accompanying video that tried to separate signal from noise on the different approaches of content in the business.

Read More

CX IN THE AGE OF PRIVACY AND TRUST, PART 3: CAN WE (RE)BUILD TRUST? CX IN THE AGE OF PRIVACY AND TRUST, PART 3: CAN WE (RE)BUILD TRUST?

blog article

Aug 14, 2019

This is the third in a series of articles on creating, maintaining, and optimizing great customer experiences in the context of mounting concerns about privacy and increasingly strict regulations governing data processing. We address topics such as consent strategies, the role of trust, the elements...

Read More

DIVERSE VOICES STRENGTHEN BRAND CHARACTER DIVERSE VOICES STRENGTHEN BRAND CHARACTER

blog article

Aug 14, 2019

What character appears in the most films and television programs? Dracula? God? Santa Claus?  All of those make the top ten list, but none is the correct answer. Satan (or The Devil) is a character is more than 840 projects – more than any other character. If you limit the list to mortals...

Read More

The History of Content Marketing THE HISTORY OF CONTENT MARKETING

infographic

Aug 14, 2019

If you want some insights into where the content marketing industry may be headed, it might just help to take a look at where it’s been. As we pointed out when CMI shared its History of Content Marketing infographic in 2012, brands have been telling their stories to audiences for hundreds of y...

Read More

USING CONTENT MARKETING TO GENERATE DEMAND, CREATE NEW AUDIENCES USING CONTENT MARKETING TO GENERATE DEMAND, CREATE NEW AUDIENCES

whitepaper

Aug 14, 2019

Content—and how brands use it to interact with buyers at all stages of the engagement journey—has fundamentally reshaped every business’ go-to-market strategy. This shift has been particularly challenging for “top-of-the-funnel” demand generation marketers, most of who ...

Read More

Cyber security: Breaching the mobile phone security perimeter CYBER SECURITY: BREACHING THE MOBILE PHONE SECURITY PERIMETER

blog article

Aug 14, 2019

The global security and privacy revolution has catapulted the process of managing, storing and exchanging data to unprecedented levels. According to a GSMA report, over 5 billion people globally are connected to mobile devices right now. App downloads are soaring—2018 was estimated to have ove...

Read More

Phishing Is No Longer Just Email: It’s Social PHISHING IS NO LONGER JUST EMAIL: IT’S SOCIAL

whitepaper

Aug 13, 2019

Despite years of publicity and millions of dollars in employee training, phishing remains the largest insider threat that organizations face.1 As many as 93% of IT security breaches are the direct result of some form of phishing2 and 34% of all phishing attacks explicitly target enterprises.3 Employ...

Read More

Detect and Prevent – Responding to cyber attacks - Embracing Technology in FS DETECT AND PREVENT – RESPONDING TO CYBER ATTACKS - EMBRACING TECHNOLOGY IN FS

video

Aug 13, 2019

As technology continues to disrupt the financial services industry, the cybersecurity challenge takes center focus as companies invest in protecting their business and consumers. Our host Tim Broome tackles the matter in-depth with security experts Dave Powell and Mark Leadbetter in our latest Embra...

Read More

Cyber Security Facts And Stats CYBER SECURITY FACTS AND STATS

infographic

Aug 12, 2019

Awesome Cyber Security Facts – Infographic. Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More

Stress and Burnout in the Cyber Security Industry: David Slade, Psychotherapist STRESS AND BURNOUT IN THE CYBER SECURITY INDUSTRY: DAVID SLADE, PSYCHOTHERAPIST

video

Aug 12, 2019

David Slade, psychotherapist, hosted the workshop 'Combatting stress and burnout in cyber security from surviving to thriving' at CREST's Access to Cyber Security Day. A report following the workshop will be released in the near future. Stay up-to-date by following CREST on social media....

Read More

Apple Expands Bug Bounty; Raises Max Reward to $1 Million APPLE EXPANDS BUG BOUNTY; RAISES MAX REWARD TO $1 MILLION

blog article

Aug 12, 2019

Apple is opening up its bug bounty program to more researchers, increasing the potential rewards and expanding the pool of qualifying products in a bid to attract tips on critical software flaws. Ivan Krstić, head of Apple's security engineering and architecture, announced the changes last week ...

Read More

Automakers warm up to friendly hackers at cybersecurity conference AUTOMAKERS WARM UP TO FRIENDLY HACKERS AT CYBERSECURITY CONFERENCE

blog article

Aug 11, 2019

At a conference where hackers can try their hand at picking locks and discover cyber vulnerabilities in a makeshift hospital, they can also endeavor to break into the control units of cars and take over driving functions. Those efforts at the DEF CON security convention in Las Vegas this weekend are...

Read More

3 Fundamental Items To Have Web Security 3 FUNDAMENTAL ITEMS TO HAVE WEB SECURITY

blog article

Aug 10, 2019

Running a website is not easy from the standpoint of security and privacy. All web publishers are making a delicate balance between cost and security technologies, the more cyber defense ready the site, the higher the cost of running them. Any web developers worth his salt knows very well that TLS c...

Read More

Cyberattacks find easy target in nation CYBERATTACKS FIND EASY TARGET IN NATION'S SCHOOLS

blog article

Aug 09, 2019

School districts across the country are increasingly becoming a major target of malicious cyberattacks, leaving both the federal government and state governments scrambling to find ways to fight back. Recent cyberattacks on school districts in Louisiana, Virginia and Oklahoma have highlighted the th...

Read More

Rebuilding Trust After Cybersecurity Lapses REBUILDING TRUST AFTER CYBERSECURITY LAPSES

blog article

Aug 08, 2019

Trust is a business fundamental, and cybersecurity lapses can rattle the trust of important constituencies. Customers avoid buying from companies they don’t trust. Investors and employees worry about their prospects and livelihoods. Security managers worry about future incidents. Even communit...

Read More

THE IMPORTANCE OF CYBERSECURITY IN 2019 THE IMPORTANCE OF CYBERSECURITY IN 2019

infographic

Aug 08, 2019

Cybersecurity is becoming a big problem for many companies in all industries, as an attack can permanently damage a business or even a person’s life. As the cybersecurity industry continues to grow at a rapid pace, the amount of malware continues to grow each year as well. To highlight the imp...

Read More

The Evolution of Industrial Cybersecurity and Cyber Risk THE EVOLUTION OF INDUSTRIAL CYBERSECURITY AND CYBER RISK

whitepaper

Aug 08, 2019

From Assessment to Automation: Addressing the Cyber Risk Lifecycle in Critical Environments Cybersecurity threats and breaches continue to make headline news with impact across all industries and sectors. The consequences of successful cybersecurity attacks, such as production disruption, product qu...

Read More

Increase virtual appliance disk space in IBM Security Identity Manager INCREASE VIRTUAL APPLIANCE DISK SPACE IN IBM SECURITY IDENTITY MANAGER

video

Aug 08, 2019

In order to expand the disk space for the IBM Security Identity Manager (ISIM) 7.0.1 Virtual Appliance, you must create a new virtual machine. Using the ISIM ISO image from Passport Advantage, you use a snapshot from the existing ISIM appliance to maintain the same configurations. This video demonst...

Read More

How to Detect a Cyber Attack Against Your Company HOW TO DETECT A CYBER ATTACK AGAINST YOUR COMPANY

blog article

Aug 08, 2019

This article is the third installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.S...

Read More

How to Recover from a Cyber Attack HOW TO RECOVER FROM A CYBER ATTACK

blog article

Aug 08, 2019

In part four of the MEP National Network five-part series on “Cybersecurity for Manufacturers,” we covered how to respond quickly to an information security breach with a prepared plan of action. Now we’ll explore effective mechanisms for restoring operations after a cybersecurity ...

Read More

ESET cybersecurity tips & tricks: Spear phishing ESET CYBERSECURITY TIPS & TRICKS: SPEAR PHISHING

video

Aug 07, 2019

Spear phishing is a tactic used by cyber criminals whereby they attempt to attack a specific individual as a conduit into the organization. The purpose of the attack is the same as with any phishing email, to gain access to login or confidential information or to deliver malware, but in this instanc...

Read More

SOCIAL MEDIA VISIBLE THREATS – ARE YOU STILL IGNORING THEM? SOCIAL MEDIA VISIBLE THREATS – ARE YOU STILL IGNORING THEM?

blog article

Aug 07, 2019

How social are you? Today, the answer to this question is defined by the number of social media accounts you own and the amount of time that you spend online. We find everyone active on social media in some form. Even businesses are implementing social media strategies actively to connect with their...

Read More

State of CyberSecurity Report 2019 STATE OF CYBERSECURITY REPORT 2019

video

Aug 06, 2019

Digital transformations are driving organizations to rethink security threats. The third annual edition of the “State of Cybersecurity Report” from Wipro builds on providing a unique perspective of the building blocks that define the global cybersecurity arena. Download the report here.

Read More

Millions of Android Smartphones Vulnerable to Trio of Qualcomm Bugs MILLIONS OF ANDROID SMARTPHONES VULNERABLE TO TRIO OF QUALCOMM BUGS

blog article

Aug 06, 2019

Flaws in Qualcomm chipset expose millions of Android devices to hacking threat. Security researchers from Tencent’s Blade Team are warning Android smartphone and tablet users of flaws in Qualcomm chipsets, called QualPwn. The bugs collectively allow hackers to compromise Android devices remote...

Read More

AI for Cybersecurity in Banking – Where Banks Are Investing Today AI FOR CYBERSECURITY IN BANKING – WHERE BANKS ARE INVESTING TODAY

blog article

Aug 06, 2019

Hackers are cyberattackers are using more sophisticated methods to break into digital networks; they themselves have also started employing artificial intelligence techniques to bypass detection systems. Cyberthreats can compromise enterprise networks at a greater speed than ever before, and cyberse...

Read More

How to Recognize A Hacked Laptop Camera? HOW TO RECOGNIZE A HACKED LAPTOP CAMERA?

blog article

Aug 05, 2019

A laptop is a portable computer that is small-sized and thin to be carried around for personal work. Its features can be used for different purposes, one of them being the laptop camera that is used for taking photos, video calls in Facebook or Whats App if you are into a long-distance relationship ...

Read More

Your mobile workforce is a security threat YOUR MOBILE WORKFORCE IS A SECURITY THREAT

infographic

Aug 05, 2019

And the increase in mobile phone usage is actually driving a rise in cybercrime. This infographic illustrates the results of recent mobile security research. We think you’ll find it eye-opening.

Read More

Fortinet and AlgoSec Security Management Suite FORTINET AND ALGOSEC SECURITY MANAGEMENT SUITE

whitepaper

Aug 05, 2019

Fortinet (NASDAQ: FTNT) is a global provider of highperformance network security and specialized security solutions that provide our customers with the power to protect and control their IT infrastructure. Our purpose-built, integrated security technologies, combined with our FortiGuard security int...

Read More

What is ethical hacking? A guide to white-hat attacks and penetration tests WHAT IS ETHICAL HACKING? A GUIDE TO WHITE-HAT ATTACKS AND PENETRATION TESTS

blog article

Aug 05, 2019

It sounds crazy to the uninitiated, but organisations across the globe pay people to break into their systems and find sensitive information. The reason they do this is simple: to catch a thief, you must think like one. Organisations hire ethical hackers to make sure they have someone who’s on...

Read More

For Cybersecurity, Size Doesn’t Matter FOR CYBERSECURITY, SIZE DOESN’T MATTER

blog article

Aug 05, 2019

Las Vegas—Small pharmacies, whether focused on specialty, home infusion or other trade channel, should not believe that because of their size, they are not at risk for cyber threats. Organizations without the finances and on-site information technology expertise to ensure the security of their...

Read More

How to Protect Your Business from Cyber Attacks HOW TO PROTECT YOUR BUSINESS FROM CYBER ATTACKS

blog article

Aug 05, 2019

This article is the second installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U....

Read More

4 Easy Ways to Thwart Hackers and Scammers 4 EASY WAYS TO THWART HACKERS AND SCAMMERS

blog article

Aug 05, 2019

Hackers and scammers are a growing threat in a world increasingly dependent on the World Wide Web. The IoT has given internet access to billions of people around the globe which has increased the exposure to unsecured and dangerous connections. While the IoT has been undoubtedly beneficial, the risk...

Read More

Capital One Data Breach, Equifax Settlement Payouts, Nextdoor App Scams CAPITAL ONE DATA BREACH, EQUIFAX SETTLEMENT PAYOUTS, NEXTDOOR APP SCAMS

video

Aug 04, 2019

Everything you need to know about the Capital One data breach, changes in the payouts from the Equifax settlement, and Nextdoor app scams. The Weekly Blaze podcast is your update on the top 3 security and privacy news stories from the past week. These podcasts are published every Monday and are 15 m...

Read More

Cybersecurity: the motivation behind cyber-hacks CYBERSECURITY: THE MOTIVATION BEHIND CYBER-HACKS

infographic

Aug 04, 2019

Cyber-attacks are becoming more sophisticated all the time, with cyber hackers coming up with new and determined methods of threat that are increasingly difficult to detect, making attacks more dangerous than ever before. Statistics show that cybercrime is on the rise around the world. It’s es...

Read More

Malwarebytes Anti-Malware for Mac MALWAREBYTES ANTI-MALWARE FOR MAC

whitepaper

Aug 04, 2019

Malwarebytes Anti-Malware for Mac is an application for Mac OS X designed to remove malware and adware from your computer. It is very simple to use, and for most problems, should clean up your system in less than a minute, from start to finish. Just open the app, click the Scan button, and remove an...

Read More

The Three Biggest Hacks Affecting Americans Today THE THREE BIGGEST HACKS AFFECTING AMERICANS TODAY

video

Aug 04, 2019

Americans are reminded almost daily of just how fragile the internet-based financial and commercial infrastructure is. Some data breaches have important political significance. Others represent new trends in cybersecurity and online crimes. Equifax's records were compromised in September 2017, e...

Read More

MOBILE ANTIVIRUS AS MUCH OF A THREAT AS MALWARE MOBILE ANTIVIRUS AS MUCH OF A THREAT AS MALWARE

blog article

Aug 04, 2019

With an estimated 2.71 billion smartphone users worldwide, you may be surprised to find out that your phone probably a security risk to you. New research has shown that the Android system, in particular, has a massive security problem. Before you close this post comfortable in knowing that you have ...

Read More

What is cryptojacking? How to prevent, detect, and recover from it WHAT IS CRYPTOJACKING? HOW TO PREVENT, DETECT, AND RECOVER FROM IT

blog article

Aug 02, 2019

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a website or online ad with JavaScript code that auto-exe...

Read More

Intelligent Server Defense Counter Advanced Attacks with Both Network and Endpoint Security INTELLIGENT SERVER DEFENSE COUNTER ADVANCED ATTACKS WITH BOTH NETWORK AND ENDPOINT SECURITY

whitepaper

Aug 01, 2019

The average employee operates in a world where mobile devices constantly interact with servers in data centers and in the cloud, sharing all manner of sensitive data as business is more often conducted outside the office than inside. This can leave an open attack path to an organization’s crow...

Read More

Definition and types of FIREWALLS DEFINITION AND TYPES OF FIREWALLS

video

Aug 01, 2019

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules Types of Firewalls 1- Proxy firewall. 2- Stateful inspection firewall. 3- Unified threat management (UTM) firewa...

Read More

Cybersecurity for Startups: How to Protect Your Business CYBERSECURITY FOR STARTUPS: HOW TO PROTECT YOUR BUSINESS

blog article

Aug 01, 2019

Large-scale data breaches, such as the Equifax hack, are ubiquitous nowadays. But if you think that breaches only affect high-profile companies, then you are mistaken. In fact, three out of five small- and medium-sized enterprises (SMEs) have fallen victim to a cyber attack. Many small businesses th...

Read More

Why Complexity Issues Persist in SIEM and Cybersecurity WHY COMPLEXITY ISSUES PERSIST IN SIEM AND CYBERSECURITY

blog article

Aug 01, 2019

Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They ...

Read More

Inside Viasat’s Cyber Security Operations Center INSIDE VIASAT’S CYBER SECURITY OPERATIONS CENTER

blog article

Aug 01, 2019

Viasat’s growing CSOC offers cybersecurity to government and private sector customers in the U.S. and beyond. The modern battlespace is all about combined arms. All the various weapons of war – infantry, tanks, artillery, aircraft – must operate in tight coordination, enhancing eac...

Read More

The Forrester New Wave™: Bot Management THE FORRESTER NEW WAVE™: BOT MANAGEMENT

whitepaper

Aug 01, 2019

If your business has a web presence, then chances are that your applications are being hit by sophisticated bots every day. Automated attackers are stealing customer data, committing fraud, disrupting e-commerce, and more. And they’re mimicking human users to successfully escape detection. Bot manag...

Read More

Five Steps to Mitigating Data Breach Risks FIVE STEPS TO MITIGATING DATA BREACH RISKS

whitepaper

Aug 01, 2019

Traditional security approaches, such as perimeter-based and role-based security, tend to lockdown everything by default, which limits legitimate data usage and frustrates business users. Above all, they cannot stop data breaches. Businesses need to embrace risk assessment approach and security must...

Read More

Cybersecurity: Are your passwords stored securely CYBERSECURITY: ARE YOUR PASSWORDS STORED SECURELY

blog article

Aug 01, 2019

The use of malware designed to harvest consumers’ digital data—known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users, targeted by the stealers, peaked from less than 6,00,000 in the first half of 2018 to over 9,40...

Read More

The Forrester New Wave™: Bot Management THE FORRESTER NEW WAVE™: BOT MANAGEMENT

whitepaper

Aug 01, 2019

If your business has a web presence, then chances are that your applications are being hit by sophisticated bots every day. Automated attackers are stealing customer data, committing fraud, disrupting e-commerce, and more. And they’re mimicking human users to successfully escape detection. Bot manag...

Read More

SMB Cybersecurity Statistics SMB CYBERSECURITY STATISTICS

infographic

Jul 31, 2019

Small and medium sized businesses are facing an increasingly challenging threat landscape. Over the last few years, there has been an increase in the number of breaches, damages from attacks, and threats targeted against their businesses.

Read More

Kaspersky Security for Enterprise KASPERSKY SECURITY FOR ENTERPRISE

whitepaper

Jul 31, 2019

Building a security foundation for your organization by choosing the right product or service is the first step. But developing a forward-thinking corporate cybersecurity strategy is key to long-term success. Kaspersky’s Enterprise Portfolio reflects the security demands of today’s busin...

Read More

You must be able to recognize these cyber attacks YOU MUST BE ABLE TO RECOGNIZE THESE CYBER ATTACKS

video

Jul 31, 2019

Data is like gold in the digital age. Being careless with information is risky for any company, which is why IT security is so important. What are the most common stumbling blocks? How can you spot them.

Read More

6 Challenges In Using Open Source Cybersecurity Tools 6 CHALLENGES IN USING OPEN SOURCE CYBERSECURITY TOOLS

blog article

Jul 31, 2019

When it comes to cybersecurity, tools and infrastructure matter a lot in order to battle notorious threats. Companies across the world have of late understood the importance of having strong cybersecurity and are trying every possible tool or software to make it better. There are two types of tools ...

Read More

DDoS Attacks in the Second Quarter of 2019: Increasing Attack Bandwidths DDOS ATTACKS IN THE SECOND QUARTER OF 2019: INCREASING ATTACK BANDWIDTHS

infographic

Jul 30, 2019

These attacks are easily capable of overloading many companies’ broadband connections. There are several DDoS-for-hire services offering attacks between 10 and 100 Gbps for a modest fee. Currently, one DDoS provider is offering free DDoS attacks of up to 200 Mbps bandwidth for a duration of fi...

Read More

5 tips for better password security 5 TIPS FOR BETTER PASSWORD SECURITY

infographic

Jul 30, 2019

You probably see articles about the importance of having better password security fairly often–and for good reason. Year after year, cyber security companies report that most computer users are choosing the same weak passwords, with passwords like ‘123456’ and ‘password&rsquo...

Read More

QUARTERLY THREAT REPORT Q2-2019 QUARTERLY THREAT REPORT Q2-2019

whitepaper

Jul 30, 2019

The second quarter of 2019 had comparatively lesser detections of around 242 million Windows malware as compared to Q1 of 2019. The quarter started on a high note with April clocking the highest detection of 82 Million windows malware. On a daily basis, Quick Heal detected around 2.5 Million malware...