RESOURCES


home.aspx
   
3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020 3 TRENDS IN DATA PRIVACY BREACH LAWS THAT WILL CARRY OVER TO 2020

blog article

Feb 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move int...

Read More

Ryuk: Defending Against This Increasingly Busy Ransomware Family RYUK: DEFENDING AGAINST THIS INCREASINGLY BUSY RANSOMWARE FAMILY

blog article

Feb 12, 2020

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a thr...

Read More

New Ransomware hitting Industrial Control Systems like a nuclear bomb NEW RANSOMWARE HITTING INDUSTRIAL CONTROL SYSTEMS LIKE A NUCLEAR BOMB

blog article

Feb 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of ...

Read More

Cybercriminals are taking advantage of vulnerable education systems CYBERCRIMINALS ARE TAKING ADVANTAGE OF VULNERABLE EDUCATION SYSTEMS

blog article

Feb 09, 2020

It’s an unfortunate fact that every establishment with a network connection is vulnerable to security attacks and the gaze of cybercriminals. One particular space which is open to the latest threats, but may lack the necessary tools to tackle it, is the education system. Students today use a w...

Read More

Security by Sector: Cyber-Attack Could Create Financial Crisis, Says ECB Chief SECURITY BY SECTOR: CYBER-ATTACK COULD CREATE FINANCIAL CRISIS, SAYS ECB CHIEF

blog article

Feb 07, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r...

Read More

AskOptiv: Defending Against AI Weaponized Threats ASKOPTIV: DEFENDING AGAINST AI WEAPONIZED THREATS

blog article

Feb 05, 2020

2020 is the year for us to seriously consider artificial intelligence (AI) and how it impacts operations, including those involving of threat actors. With all the buzz around the very broad concepts of automation and AI within computer science we should begin by briefly discussing exactly what artif...

Read More

Nine Steps to Cybersecurity NINE STEPS TO CYBERSECURITY

blog article

Feb 05, 2020

There is no need to say that data security is important. Everybody knows that, everybody agrees. On the other hand, knowledge that ‘admin1’ and ‘password1’ are not strong login credentials is also pretty common…but that doesn’t mean they are not still among the m...

Read More

A Framework for Measuring InfoSec as a Business Function A FRAMEWORK FOR MEASURING INFOSEC AS A BUSINESS FUNCTION

blog article

Feb 02, 2020

In my December column, I ended with the observation that many CISOs struggle when it comes to first determining and then actually communicating the business value of the security options out there. Often, that failure stems from CISOs who lack a background in finance and economics, and their inabili...

Read More

Mapping the Known Unknowns of Cybersecurity Education MAPPING THE KNOWN UNKNOWNS OF CYBERSECURITY EDUCATION

blog article

Feb 02, 2020

Cybersecurity is of increasing importance to societies around the world. This is reflected in national debates, where news stories about breaches, attacks, and policy challenges find their way into the headlines nearly every day. It is also reflected in the curricula of colleges and universities; ma...

Read More

5G choices: a pivotal moment in world affairs 5G CHOICES: A PIVOTAL MOMENT IN WORLD AFFAIRS

blog article

Jan 30, 2020

It is disappointing that the Brits are doing the wrong thing on 5G, having not exhausted other possibilities. Instead they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk that Chinese intelligence services could use Huawei’s a...

Read More

New Maryland Bill Will Make Possession of Ransomware Illegal NEW MARYLAND BILL WILL MAKE POSSESSION OF RANSOMWARE ILLEGAL

blog article

Jan 30, 2020

A new bill introduced in the Maryland Senate aims to make the possession of ransomware illegal in the state. In May 2019, the city of Baltimore experienced its biggest run-in with ransomware. One of the largest municipalities in the city was attacked by ransomware and malicious actors asked for 13 B...

Read More

Top 5 cybersecurity threats to the UK healthcare sector TOP 5 CYBERSECURITY THREATS TO THE UK HEALTHCARE SECTOR

blog article

Jan 28, 2020

The sheer volume and complexity of data held within the UK healthcare sector makes it a challenge from a cybersecurity perspective to keep secure. In fact, research from a survey we conducted recently revealed that 67% of healthcare organizations in the UK have suffered a cybersecurity incident over...

Read More

Cybersecurity with Cloud Computing CYBERSECURITY WITH CLOUD COMPUTING

blog article

Jan 28, 2020

As more organizations adopt cloud computing, it’s imperative they keep cybersecurity front-of-mind. Some analysts project that public cloud spend could increase to $500 billion by 2023, with infrastructure as one of its largest categories — and industry experts have their eye on security...

Read More

ANTI-FORENSIC TECHNIQUES: A CALL FOR DIGITAL FORENSICS ANTI-FORENSIC TECHNIQUES: A CALL FOR DIGITAL FORENSICS

blog article

Jan 27, 2020

After the positive attempt of digital forensics to minimize cyberattacks, anti-forensic techniques came into existence to make it challenging for cyber forensic experts to identify culprits. It has been hindering the work of computer investigators, ever since its inception. The basic idea behind ant...

Read More

Big Data, Big Risks: Addressing the High-Tech & Telecoms Threat Landscape BIG DATA, BIG RISKS: ADDRESSING THE HIGH-TECH & TELECOMS THREAT LANDSCAPE

blog article

Jan 26, 2020

The benefits of industry 4.0 have been well reported and the world of work has been revolutionized. Almost every organization operating today actively utilizes, or relies on, technologies that are becoming increasingly advanced. Both industry and society have adopted a data-driven culture in which i...

Read More

Here’s the Top Cyber-Security Software You Need To Consider Downloading For 2020 HERE’S THE TOP CYBER-SECURITY SOFTWARE YOU NEED TO CONSIDER DOWNLOADING FOR 2020

blog article

Jan 26, 2020

Did you know that there are 350,000 new malware (malicious software) types are discovered every day, with the total number of known malware almost reaching 1 billion in 2019? That’s a lot of threats for one piece of software to prevent, and there are certainly areas where using anti-malware wo...

Read More

Are university networks wide open to cyber-attacks? ARE UNIVERSITY NETWORKS WIDE OPEN TO CYBER-ATTACKS?

blog article

Jan 23, 2020

The explosion of the Internet of Things (IoT) – that is, anything from laptops to printers to security cameras and heating sensors that connect to the internet – has meant that organisations and institutions today struggle to get a comprehensive view of all the IT endpoints that connect ...

Read More

PoC Exploits Do More Good Than Harm: Threatpost Poll POC EXPLOITS DO MORE GOOD THAN HARM: THREATPOST POLL

blog article

Jan 22, 2020

When it comes to the release of proof-of-concept (PoC) exploits, more security experts agree that the positives outweigh the negatives, according to a recent and informal Threatpost poll. Last week, Threatpost conducted a reader poll and almost 60 percent of 230 security pundits thought it was a &ld...

Read More

Cyber-security salaries soar as firms scrabble to lock up data CYBER-SECURITY SALARIES SOAR AS FIRMS SCRABBLE TO LOCK UP DATA

blog article

Jan 20, 2020

Reed’s report showed rises across the board for all IT-related roles, with technology the fastest-growing sector last year after a 13.8 per cent hike in jobs posted and a 4.7 per cent increase in the average salary. With the number of data breaches increasing and massive fines levied against f...

Read More

ETHICAL HACKERS: WHY YOUR ORGANIZATION NEEDS THEM ETHICAL HACKERS: WHY YOUR ORGANIZATION NEEDS THEM

blog article

Jan 20, 2020

Over the past few decades, law enforcement agencies are hiring undercover agents to solve their toughest cases. A similar concept is now applicable in the information security world. They confide in ethical hackers. The idea of hiring an ethical hacker is contradictory to many who rarely understand ...

Read More

How to Prevent Your Business Being Hacked HOW TO PREVENT YOUR BUSINESS BEING HACKED

blog article

Jan 16, 2020

During the past two months, I have been approached by four different businesses to help and support them through security breaches that have occurred. In each case, there have been common themes. My concern and frustration arise from the fact that each breach could have easily been prevented by doin...

Read More

Cybersecurity Threats Call for a Global Response CYBERSECURITY THREATS CALL FOR A GLOBAL RESPONSE

blog article

Jan 13, 2020

Last March, Operation Taiex led to the arrest of the gang leader behind the Carbanak and Cobalt malware attacks on over 100 financial institutions worldwide. This law enforcement operation included the Spanish national police, Europol, FBI, the Romanian, Moldovan, Belarusian, and Taiwanese authoriti...

Read More

Understanding Canadian cybersecurity laws: the foundations UNDERSTANDING CANADIAN CYBERSECURITY LAWS: THE FOUNDATIONS

blog article

Jan 13, 2020

The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure. Cyberspace is playing an undeniably fundamental role in our day-to-day lives and in business operations around ...

Read More

EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL? EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL?

blog article

Jan 11, 2020

The growth of cybercrime puts businesses and government agencies at the risk of constant threats to their crucial business data, customer data, financial information, and other trade secrets. Cybersecurity professionals play an important role in protecting businesses from cybercriminals. The demand ...

Read More

BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING

blog article

Jan 10, 2020

The bug bounty initiative is gaining popularity thanks to the shift in security strategies. It has proven to be a great savior from severe vulnerabilities. If cybercriminals find their way to the bug first, they may exploit it for financial gains. Cybersecurity and Infrastructure Agency (CISA) notic...

Read More

BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS

blog article

Jan 09, 2020

Every year, millions of dollars of cryptocurrency are stolen from crypto wallets. After thousands of botnet attacks, cybercriminals are now looking for new ways to make money. To this end, the introduction of cryptocurrency mining botnets came about. It is now sold as a service. Recently, French pol...

Read More

Regulatory Scrutiny Of Buy Side Will Not Abate REGULATORY SCRUTINY OF BUY SIDE WILL NOT ABATE

blog article

Jan 08, 2020

Deloitte highlighted that asset managers this year will face more regulatory scrutiny of their holdings of higher risk assets, implementation of technological change and should continue to modernize their regulatory, legal, and compliance functions. The consultancy’s 2020 Investment Management...

Read More

Top Cybersecurity Threats in 2020 TOP CYBERSECURITY THREATS IN 2020

blog article

Jan 08, 2020

A host of new and evolving cybersecurity threats has the information security industry on high alert. Ever-more sophisticated cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrency and more have placed the data and assets of corporations, governments a...

Read More

Adaptation Is Key to Determining Network Resilience in Cyberattacks, Study Finds ADAPTATION IS KEY TO DETERMINING NETWORK RESILIENCE IN CYBERATTACKS, STUDY FINDS

blog article

Jan 06, 2020

A new study shows that traditional markers of a computer network's resilience are not solely effective in determining its ability to accomplish missions. Researchers from the U.S. Army Combat Capabilities Development Command's Army Research Laboratory (ARL) partnered with Virginia Tech to de...

Read More

Hospitality Company Landry HOSPITALITY COMPANY LANDRY'S INC. IDENTIFIES MALWARE ON PAYMENT SYSTEM

blog article

Jan 02, 2020

Landry's, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment and gaming corporation, has reported that it identified malware on its payment processing system. Headquartered in Houston, Texas. Landry's, Inc. owns and operates more than 600 restaurants, hotels, ...

Read More

Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020 MAKE THESE SECURITY NEW YEAR’S RESOLUTIONS TO BOLSTER YOUR CYBERSECURITY IN 2020

blog article

Jan 01, 2020

The new year has arrived, and with glasses raised and timeless stories recounted, we can now look to that well-meaning but often short-lived practice we know too well: setting resolutions.Industry leaders often make fulsome commitments to changing systems for the better, fully intending to carry thr...

Read More

Here are the top cybersecurity predictions for 2020 HERE ARE THE TOP CYBERSECURITY PREDICTIONS FOR 2020

blog article

Dec 27, 2019

As 2019 comes to an end, cybersecurity experts are preparing for a new year—and a new decade—and all the cyber scams, breaches, attacks and privacy concerns that threaten consumers and businesses. CyberScout, an industry leader in cyber insurance, data security, and identity theft protec...

Read More

Ransomware Attackers May Lurk for Months, FBI Warns RANSOMWARE ATTACKERS MAY LURK FOR MONTHS, FBI WARNS

blog article

Dec 27, 2019

Warning: Attackers wielding LockerGoga and MegaCortex ransomware have been hitting large corporate networks, sometimes lingering for months before deploying crypto-locking malware. That's according to a recent FBI flash alert, marked "TLP:AMBER" - restricted to receiving organizations....

Read More

Dangers of new tech: Top cybersecurity trends that will shape 2020 DANGERS OF NEW TECH: TOP CYBERSECURITY TRENDS THAT WILL SHAPE 2020

blog article

Dec 26, 2019

As we HEAD into a new decade, there’s no doubt that attackers will try to use innovation against us but determining where they will focus is always a challenge. Here are the top security trends that will impact both businesses and consumers in 2020. Drones open up new pathway for intelligence ...

Read More

EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY

blog article

Dec 26, 2019

Cyberthreat actors are individuals or groups who work with the malicious intent of taking advantage of vulnerabilities and gaining unauthorized access to information systems. They intend to affect the victim’s data, systems, networks, or devices. The internet is an effective tool that they use...

Read More

Healthcare Cybersecurity: Reducing the Risk of Data Breaches HEALTHCARE CYBERSECURITY: REDUCING THE RISK OF DATA BREACHES

blog article

Dec 22, 2019

2019 has a bad year for healthcare security breaches. Over 30 million patients in the U.S. have been affected by data breaches so far this year. The majority of attacks have been traced back to third-party vendors and phishing attacks. Furthermore, the industry at large is still dragging its heels o...

Read More

Worst passwords of 2019: Are you using one of them? WORST PASSWORDS OF 2019: ARE YOU USING ONE OF THEM?

blog article

Dec 18, 2019

SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of events, password has for the first time in the list’s history been knocked out of the top two spots.“Invoking the n...

Read More

Decade retrospective: Cybersecurity from 2010 to 2019 DECADE RETROSPECTIVE: CYBERSECURITY FROM 2010 TO 2019

blog article

Dec 18, 2019

Yes, technically, decades begin in years that end in one, but it's easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn't work. Devices blew up due to malware or adware, and users got annoyed whe...

Read More

Ransomware Risk Management: 11 Essential Steps RANSOMWARE RISK MANAGEMENT: 11 ESSENTIAL STEPS

blog article

Dec 18, 2019

There's been a lot of discussion within the InfoSec community about ransomware - why it has been increasing, whether ransoms should be paid and how to mitigate this rapidly growing threat. The culprit that opens the door to these attacks, apparently including last week's city of New Orleans ...

Read More

10 cyber security trends to look out for in 2020 10 CYBER SECURITY TRENDS TO LOOK OUT FOR IN 2020

blog article

Dec 17, 2019

When looking for possible cyber security trends in 2020, it is clear to see that 2019 was an interesting year for all things cyber security. It was the year that brought major breaches pretty much every week. Recently, it was found that charities reported over 100 data breaches to the ICO in the sec...

Read More

Closing a Critical Gap in Cybersecurity CLOSING A CRITICAL GAP IN CYBERSECURITY

blog article

Dec 16, 2019

Last year, faced with rising threats in cyberspace, Congress established the nation’s first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). We serve as the nation’s risk adviser, which means we’re the agency responsible for working w...

Read More

THE ROLE OF AI IN CYBERSECURITY THE ROLE OF AI IN CYBERSECURITY

blog article

Dec 13, 2019

Emerging technologies put cybersecurity at risk. Even the new advancements in defensive strategies of security professionals fail at some point. Besides, as offensive-defensive strategies and innovations are running in a never-ending cycle, the complexity and volume of cyberattacks have increased. C...

Read More

Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud MAINTAIN CONTROL OF YOUR MOST SENSITIVE CONTENT WITH A PRIVATE OR ON-PREMISES CLOUD

blog article

Dec 12, 2019

Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival insti...

Read More

How to test employee cyber competence through pen-testing HOW TO TEST EMPLOYEE CYBER COMPETENCE THROUGH PEN-TESTING

blog article

Dec 11, 2019

Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help get supposedly ill-gotten cash out of their own country into a safe bank, offering a percentage of the money for their participation. While “Nigerian prince” emails have been scamming people...

Read More

The Crucial role of Cyber security and Artificial Intelligence (AI) THE CRUCIAL ROLE OF CYBER SECURITY AND ARTIFICIAL INTELLIGENCE (AI)

blog article

Dec 11, 2019

Artificial intelligence (AI) is accepting the situation as a warrior against digital threats over the globe. It has gotten mainstream in military space, yet security organizations are likewise consolidating AI technologies for using deep learning to discover likenesses and differences within a data ...

Read More

CYBERSECURITY AND AI IN TODAY’S WORLD CYBERSECURITY AND AI IN TODAY’S WORLD

blog article

Dec 10, 2019

In an always advancing cyber threat landscape where antivirus programming and firewalls are viewed as tools of antiquity, companies are currently searching for all the more technologically advanced methods for protecting classified and sensitive data. Artificial intelligence (AI) is accepting the si...

Read More

Government GOVERNMENT'S CYBER SECURITY STRATEGY PANEL 'MISSING A BIT OF DIVERSITY': AUSTCYBER CEO

blog article

Dec 09, 2019

An advisory panel that will guide the Australian government's new security strategy "does not reflect the full breadth of challenges facing the country," according to AustCyber CEO, Michelle Price.The panel selection has attracted different points of view from across the tech sector wi...

Read More

Facebook Alleges Company Infiltrated User Accounts for Ad Fraud FACEBOOK ALLEGES COMPANY INFILTRATED USER ACCOUNTS FOR AD FRAUD

blog article

Dec 06, 2019

Facebook has sued a Chinese company that it alleges used malware to compromise hundreds of thousands of user accounts – and then used them to run “deceptive ads” promoting counterfeit goods. The company in question is Hong Kong-based ILikeAd Media International Company Ltd., which ...

Read More

Face scanning – privacy concern or identity protection? FACE SCANNING – PRIVACY CONCERN OR IDENTITY PROTECTION?

blog article

Dec 05, 2019

On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial reaction, like mine, could be that this is an infringement of privacy rights. After all, why does any gover...

Read More

Digital Privacy vs. Cybersecurity: The Confusing Complexity of Information Security in 2020 DIGITAL PRIVACY VS. CYBERSECURITY: THE CONFUSING COMPLEXITY OF INFORMATION SECURITY IN 2020

blog article

Dec 04, 2019

There is a small and potentially tumultuous revolution building on the horizon of 2020. Ironically, it’s a revolution very few people on the street are even aware of but literally every single corporation around the globe currently sits in finger-biting, hand-wringing anticipation: is it ready...

Read More

What Does IMDRF WHAT DOES IMDRF'S NEW CYBERSECURITY GUIDANCE MEAN FOR YOU?

blog article

Dec 02, 2019

In the age of connectivity, cybersecurity has become critical to all stakeholders in the medical device field. Different federal agencies in the United States (U.S.), as well as agencies across the globe, have begun to address this issue through regulatory guidance and enforcement action. The U.S. h...

Read More

61% of malicious ads target Windows users 61% OF MALICIOUS ADS TARGET WINDOWS USERS

blog article

Dec 02, 2019

Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon. The company said that based on data gathered by its internal tools, 61% of the malicious ads they've observed from between July 11 and November 22, 2019 were ...

Read More

MITRE, CISA, DHS Announce 25 Most Dangerous Software Errors MITRE, CISA, DHS ANNOUNCE 25 MOST DANGEROUS SOFTWARE ERRORS

blog article

Nov 29, 2019

The Common Weakness Enumeration (CWE™) released its Top 25 Most Dangerous Software Errors (CWE Top 25), a demonstrative list of the most widespread and critical weaknesses that can lead to serious vulnerabilities in software."These weaknesses are often easy to find and exploit. They are d...

Read More

The Need for a Security Culture to Combat Cyber Threats THE NEED FOR A SECURITY CULTURE TO COMBAT CYBER THREATS

blog article

Nov 28, 2019

The shipping industry is the lifeblood of the worldwide economy. Through the global maritime community, vessels and port facilities are highly dependent on sophisticated technologies, and vessels are increasingly using systems that depending on digitization, digitalization, integration and automatio...

Read More

PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING PROTECT YOUR SECTOR: THE IMPORTANCE OF THREAT SHARING

blog article

Nov 27, 2019

Ignorance is the most commonly blamed factor in large-scale cyberattacks, but it’s worth remembering that there are at least two types of ignorance, one being the lack of threat sharing. It’s true that many employees – especially in the public sector – remain ill-informed whe...

Read More

5 Digital Threats to Watch Out for on Black Friday 5 DIGITAL THREATS TO WATCH OUT FOR ON BLACK FRIDAY

blog article

Nov 26, 2019

The end of November is a busy time in the United States. On Thanksgiving, friends and family gather together to give thanks for good food and good company. Once they’ve put away the leftovers, many Americans don their coats and head to the malls for Black Friday. The official start to the Chri...

Read More

Spear Phishing: Important Things You Should Know to Stay Safe SPEAR PHISHING: IMPORTANT THINGS YOU SHOULD KNOW TO STAY SAFE

blog article

Nov 26, 2019

It’s something that most think while on a break from work, only to be caught up by their duties and responsibilities soon. They get the better of them and the question remains unanswered. It seems relatable, right? I am pretty sure it is. But hey! Let’s concentrate on the answer and it&r...

Read More

LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET LOCAL GOVERNMENTS: RANSOMWARE ATTACK’S HOTTEST TARGET

blog article

Nov 24, 2019

From Florida to a group of cities in Texas, even Baltimore to Atlanta, the frequency of ransomware attacks against local governments is rapidly rising. A recent report from Barracuda Networks confirmed that out of hundreds of attacks, nearly two-third of ransomware attacks targeted local government ...

Read More

Security lapse exposes personal data of 6,500 Singapore accountants SECURITY LAPSE EXPOSES PERSONAL DATA OF 6,500 SINGAPORE ACCOUNTANTS

blog article

Nov 22, 2019

A folder containing personal data of 6,541 accountants in Singapore was "inadvertently" sent to multiple parties, in a security lapse that was uncovered only months after when a review was conducted. The incident exposed personal details such as names, national identification number, date ...

Read More

The Future of Security is Converged THE FUTURE OF SECURITY IS CONVERGED

blog article

Nov 20, 2019

Businesses commonly divide their security teams into two silos: physical and cyber/IT, with industrial organizations even dividing their teams across three: physical, operational (OT) and cyber/IT. However, as threats evolve and as bad actors become more intelligent, and with the goal of being proac...

Read More

SMART CITIES AND CYBERSECURITY: THE ESSENTIALS SMART CITIES AND CYBERSECURITY: THE ESSENTIALS

blog article

Nov 19, 2019

With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag...

Read More

2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS 2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS

blog article

Nov 19, 2019

Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a ...

Read More

The Navy THE NAVY'S NETWORKS ARE VULNERABLE TO CYBER ATTACKS IT'S TIME FOR ACTION

blog article

Nov 18, 2019

The threat to the U.S. Navy from cyber intrusion has become a crisis. Hackers, particularly those from Russia and China, are not limiting themselves to attacks on computers and networks. Now they are engaged in a massive assault on the entire Navy enterprise, including ships, weapons systems, resear...

Read More

MEASURING ORGANIZATION’S CYBERSECURITY MEASURING ORGANIZATION’S CYBERSECURITY

blog article

Nov 15, 2019

No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought...

Read More

VA continues to struggle with information security, watchdogs say VA CONTINUES TO STRUGGLE WITH INFORMATION SECURITY, WATCHDOGS SAY

blog article

Nov 15, 2019

Two watchdog agencies told lawmakers Thursday that the Veterans Affairs Department continues to struggle with cybersecurity issues, despite recent improvements. Audits have identified numerous information security vulnerabilities—and insufficient attempts to remedy them—at the VA, leader...

Read More

Balancing Patient Engagement and Awareness with Medical Device Cybersecurity BALANCING PATIENT ENGAGEMENT AND AWARENESS WITH MEDICAL DEVICE CYBERSECURITY

blog article

Nov 14, 2019

Medical devices are increasingly more advanced and interconnected, sharing information via Wi-Fi, the internet, our phones and across hospital networks. While the software and networking features behind these devices can support safer, more convenient and timely health care delivery, they also can i...

Read More

Enterprises Need to Focus on Cybersecurity Strategies Around 5G ENTERPRISES NEED TO FOCUS ON CYBERSECURITY STRATEGIES AROUND 5G

blog article

Nov 13, 2019

Companies need to implement technologies like virtualization and automation to protect themselves from cyber threats that 5G will bring. AT&T has prepared the report after surveying 704 security practitioners from North America, Australia, and the UK, to know how prepared enterprises are for the...

Read More

Tips for Staying Safe Online TIPS FOR STAYING SAFE ONLINE

blog article

Nov 12, 2019

Almost one-fifth of organisations in Ireland have reported at least one technology-related security incident in the last 12 months. According to the Central Statistics Office (CSO), these attacks can have significant consequences, with 5% reporting that it resulted in the destruction or corruption o...

Read More

Hire hackers, halt cyber attacks and safeguard your data HIRE HACKERS, HALT CYBER ATTACKS AND SAFEGUARD YOUR DATA

blog article

Nov 12, 2019

At a time when cyber attacks on businesses across industries are multiplying as they go digital, joining hacker-powered bug bounty and vulnerability disclosure programmes is the key to minimise such incidents and safeguard your key data, a top cyber security officer said on Tuesday.Hacker-powered se...

Read More

How we can make Americans safer online HOW WE CAN MAKE AMERICANS SAFER ONLINE

blog article

Nov 11, 2019

Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of time and energy has been devoted to improving cybersecurity and cyber hygiene. Sadly, despite thos...

Read More

AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G AT&T CYBERSECURITY INSIGHTS™ REPORT: SECURITY AT THE SPEED OF 5G

blog article

Nov 11, 2019

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in ...

Read More

Councils lack resources to manage cyber threats COUNCILS LACK RESOURCES TO MANAGE CYBER THREATS

blog article

Nov 11, 2019

Local Government Professionals Australia has made a submission to the federal government’s 2020 Cyber Security Strategy identifying ways it can support local government. A report surveying local government CEOs and general managers, JLT Public Sector Risk Report 2019, by risk consultancy JLT i...

Read More

POLY HELPS EMPOWER CONTACT CENTER WORKERS POLY HELPS EMPOWER CONTACT CENTER WORKERS

blog article

Nov 11, 2019

It’s a well-documented trend that the rise of digital channels such as webchat, apps, FAQs, etc., has led to a change in the way contact centers handle interactions. The routine, “easy” interactions are now handled by self-service channels. Deflecting these low-value interactions h...

Read More

Protect the Business from Edge to AI with Cloudera Cybersecurity PROTECT THE BUSINESS FROM EDGE TO AI WITH CLOUDERA CYBERSECURITY

blog article

Nov 07, 2019

Gartner estimates 30x connected device growth by 2020. Faster 5G networks bringing an explosion of inexpensive, connected devices. This enables new and more innovative applications and capabilities to improve customer experience. However, all these new applications and connections also broaden the n...

Read More

10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME 10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME

blog article

Nov 06, 2019

When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year. Being cautious while tending to financial transactions won’t ensure that you are cyber safe. ...

Read More

Facebook Privacy Breach: 100 Developers Improperly Accessed Data FACEBOOK PRIVACY BREACH: 100 DEVELOPERS IMPROPERLY ACCESSED DATA

blog article

Nov 06, 2019

Facebook said that 100 third-party app developers have improperly accessed the names and profile pictures of members in various Facebook groups – data that was restricted in 2018 by the platform after its Cambridge Analytica privacy snafu. Facebook said that the developers – including 11...

Read More

This Website Has Solved Cybersecurity THIS WEBSITE HAS SOLVED CYBERSECURITY

blog article

Nov 06, 2019

Big companies that hold our personal data get hacked almost every day, but most don’t really know how to deal with getting hacked, especially when it comes to telling users what happened. If you’ve read some data breach disclosures or notices, you know the classic “we take your pri...

Read More

Get Out! The FUD Is Coming from the Inside GET OUT! THE FUD IS COMING FROM THE INSIDE

blog article

Nov 05, 2019

On LinkedIn, Ron C. of CoreSolutions Software said, “Cybersecurity is no longer just a technical problem. It’s now more of a people problem! So why aren’t businesses prioritizing security awareness training for their staff?” There was a massive response and mixed agreement. R...

Read More

Healthcare cyberattacks raise questions about cybersecurity training HEALTHCARE CYBERATTACKS RAISE QUESTIONS ABOUT CYBERSECURITY TRAINING

blog article

Nov 04, 2019

A recent search showed the Office for Civil Rights was investigating 548 such breaches in the last 24 months. These included health information breaches at hospitals, cancer centers, hospice facilities, group practices and more.Perhaps as concerning as the rate at which these healthcare cyberattacks...

Read More

Are You Prepared for a Ransomware Attack? ARE YOU PREPARED FOR A RANSOMWARE ATTACK?

blog article

Nov 04, 2019

What if you walked into your office tomorrow and you couldn’t access any of your data–and neither could anyone else on your network? For a growing number of businesses and local governments, that nightmare has become a reality this year thanks to a growing number of ransomware attacks. I...

Read More

A Security Failure in the White House A SECURITY FAILURE IN THE WHITE HOUSE

blog article

Nov 01, 2019

At the time, ODNI predicted similar Russian efforts in the future. That prediction has come to pass: The FBI has reported Russian efforts against the 2020 elections. Nor are they the only ones taking aim at U.S. elections. Facebook recently found evidence of Iranian operations against the Trump camp...

Read More

Expert Advise On New ‘Unremovable’ xHelper Malware EXPERT ADVISE ON NEW ‘UNREMOVABLE’ XHELPER MALWARE

blog article

Oct 31, 2019

Over the past six months, the xHelper Android malware strain has made a name for itself after popping up on the radar of several antivirus companies, and annoying users thanks to a self-reinstall mechanism that has made it near impossible to remove. First spotted back in March but slowly expanded to...

Read More

Mimecast: Tackling Cybersecurity in a connected economy MIMECAST: TACKLING CYBERSECURITY IN A CONNECTED ECONOMY

blog article

Oct 31, 2019

Mimecast, founded in 2003, is an international cyber resilience company, with offices in the UK, US, South Africa, Australia, Europe and the Middle East. Mimecast uses dispersed data centers, intelligent mail routing and robust cloud security to provide a security network capable of managing over 35...

Read More

Cybersecurity made simple: five steps SMEs can take to guard against attack CYBERSECURITY MADE SIMPLE: FIVE STEPS SMES CAN TAKE TO GUARD AGAINST ATTACK

blog article

Oct 31, 2019

Cybersecurity can be an intimidating subject for many small and medium businesses because the threats are so varied, from email fraud and ransomware infections to data breaches. But behind the technical descriptions of the types of risks, there are actually some simple, straightforward actions you c...

Read More

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath SMBS LACK RESOURCES TO DEFEND AGAINST CYBERATTACKS, PLUS PAY MORE IN THE AFTERMATH

blog article

Oct 31, 2019

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks much like the a...

Read More

Insider Threats: A Problem That is Preventable INSIDER THREATS: A PROBLEM THAT IS PREVENTABLE

blog article

Oct 30, 2019

Earlier this summer, I read a fascinating story about McAfee launching a lawsuit against three former employees. The lawsuit alleged that these employees conspired to steal trade secrets on behalf of their new employer, accusing them of moving to a competitor and exfiltrating business-sensitive docu...

Read More

The Future of AI in Cybersecurity THE FUTURE OF AI IN CYBERSECURITY

blog article

Oct 29, 2019

The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed on products ranging from smartwatches to washing machines and of course every security tool on the market. Advertisements lead us to believe that if you couldn’t find a way t...

Read More

What Do Hurricanes and Cybersecurity Have in Common? WHAT DO HURRICANES AND CYBERSECURITY HAVE IN COMMON?

blog article

Oct 29, 2019

With hurricanes intensifying, it’s not hard to imagine this scenario: it’s early October and the Weather Channel is extensively covering a hurricane that’s going to hit the East Coast of the United States in five days. Right now, it’s just a tropical storm somewhere near Cuba...

Read More

2019 Top Three Privacy Trends in US Lawmaking 2019 TOP THREE PRIVACY TRENDS IN US LAWMAKING

blog article

Oct 29, 2019

The original version of this blog, excluding NICE references, was initially published in Lydia de la Torre's Medium Blog. The version below has been extensively edited. The original version can be accessible here. The year 2019 began with a significant increase in bill introductions at the State...

Read More

Say It Loud! I Didn’t Read the Privacy Policy and I’m Proud! SAY IT LOUD! I DIDN’T READ THE PRIVACY POLICY AND I’M PROUD!

blog article

Oct 29, 2019

We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. W...

Read More

2020 Cyber Security Trends You Should Be Aware Of 2020 CYBER SECURITY TRENDS YOU SHOULD BE AWARE OF

blog article

Oct 28, 2019

Cybersecurity is a fast-evolving game of wits where hackers and defenders continue to outmanoeuvre one another. Staying up to date with the latest trends in cybersecurity is not only beneficial; it’s imperative for everyone involved. Large-scale data breaches always make it to the headlines &n...

Read More

Will AI Driven Cyber Security Help Stop Malicious Attacks? WILL AI DRIVEN CYBER SECURITY HELP STOP MALICIOUS ATTACKS?

blog article

Oct 24, 2019

In this era of modern technology, cyber-attacks occur in many cases and are predominant than ever before. Artificial Intelligence in cyber security has been helping IT professionals to predict and block the cyber-attacks more effectively. AI has shaken the cybersecurity industry with its astonishing...

Read More

What is cyber security? WHAT IS CYBER SECURITY?

blog article

Oct 24, 2019

Cyber security is the practice of reducing the risk of cyber attacks, which pose a threat to computers, servers, mobile phones, electronic systems and networks. Also known as Information Technology Security, or Electronic Information Security, it is broadly split into three ‘pillars’; pe...

Read More

How America HOW AMERICA'S CYBER STRATEGY COULD CREATE AN INTERNATIONAL CRISIS

blog article

Oct 23, 2019

The United States has adopted a new cyber warfare strategy focused on “persistent engagement” and “forward defense” in an attempt to thwart Chinese, Russian and other state-sponsored cyber attacks. While this unprecedented “defend forward” approach gives America m...

Read More

Four Key Strategies to Combat Ransomware FOUR KEY STRATEGIES TO COMBAT RANSOMWARE

blog article

Oct 23, 2019

The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact, and recommendations for recovery and continuity in the face of the growing threat. Our report reveals that 85% of MSPs surveyed report ransomware as the most common malware threat to sm...

Read More

BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE BUILDING MORE PRODUCTIVITY INTO OUR HEADSETS WITH AMAZON ALEXA AND TILE

blog article

Oct 23, 2019

If you’re like me, one of the first things you do when you leave the house in the morning is put on your headset. I may be joining a meeting, calling a friend, getting coffee – sometimes all three – before I even set foot in the office. When I get to work, I’m collaborating w...

Read More

POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS POLY STUDIO IS NOW CERTIFIED FOR MICROSOFT TEAMS

blog article

Oct 22, 2019

It seems like every photo shown of a business in action these days features a bunch of people in a huddle room, looking productive – just like our own Poly beauty shot below. But the technology that is IN the room really matters most to the people who are joining remotely – the people NO...

Read More

Avast target of cyber-security attack, company and Czech counterintelligence say AVAST TARGET OF CYBER-SECURITY ATTACK, COMPANY AND CZECH COUNTERINTELLIGENCE SAY

blog article

Oct 22, 2019

Czech-based Avast and Czech counterintelligence service BIS said on Monday they had detected a network attack on the cyber-security company which the BIS suspected of originating in China. Avast said in a blog post that it found suspicious behaviour on its network on Sept. 23 and opened an investiga...

Read More

Cybersecurity: a crucial issue for industry and transport stakeholders CYBERSECURITY: A CRUCIAL ISSUE FOR INDUSTRY AND TRANSPORT STAKEHOLDERS

blog article

Oct 21, 2019

Cybersecurity is defined as all the technical and non-technical measures of protection that enable an information system to withstand events liable to compromise the availability, integrity, confidentiality or associated proofs (identity, authenticity, traceability) of data stored, processed or tran...

Read More

Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software MICROSOFT TO REWARD HACKERS FOR FINDING BUGS IN OPEN SOURCE ELECTION SOFTWARE

blog article

Oct 18, 2019

Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide. Whether it's American voting machines during the 2016 presidential election or India's EVMs during 2014 general elections, the integrity, transparency, and security of electr...

Read More

Security by Sector: Cyber-Criminals Seek to Exploit Automotive Manufacturing SECURITY BY SECTOR: CYBER-CRIMINALS SEEK TO EXPLOIT AUTOMOTIVE MANUFACTURING

blog article

Oct 18, 2019

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r...

Read More

The Identity Challenge: How Can Banks Know Who’s Who? THE IDENTITY CHALLENGE: HOW CAN BANKS KNOW WHO’S WHO?

blog article

Oct 17, 2019

Technology has transformed the world of banking, bringing all manner of new services to the table and revolutionising the way that customers manage their finances. Gone are the days of fixed branches and localised appointments. Today’s banking is done with the click of a button. However, techn...

Read More

Maritime Meets Cyber Security MARITIME MEETS CYBER SECURITY

blog article

Oct 16, 2019

As of October 2019, to the best of my knowledge, there has not been a single, dedicated hacking attack against a vessel at sea by malicious actors. While there have been rumors specifically one from an American telco provider in 2016 that hackers have teamed up with pirates to track high value cargo...

Read More

Cryptojacking worm infects exposed Docker deployments CRYPTOJACKING WORM INFECTS EXPOSED DOCKER DEPLOYMENTS

blog article

Oct 16, 2019

Attackers are exploiting Docker Engine deployments that are exposed to the internet without authentication to deploy and run cryptojacking malware on servers. A new cryptojacking botnet with self-spreading capabilities has infected over 2,000 such Docker deployments so far. There have been incidents...

Read More

FIN7 Gang Returns With New Malicious Tools: Researchers FIN7 GANG RETURNS WITH NEW MALICIOUS TOOLS: RESEARCHERS

blog article

Oct 15, 2019

Despite a major law enforcement crackdown on some of its members in 2018, the FIN7 financial hacking gang has returned with new malicious tools, including a revamped dropper and payload, as part of a new campaign, according to a recent analysis from FireEye. For several years, FIN7 hackers targeted ...

Read More

The top ten password-cracking techniques used by hackers THE TOP TEN PASSWORD-CRACKING TECHNIQUES USED BY HACKERS

blog article

Oct 14, 2019

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you. You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay ...

Read More

What is cybersecurity? WHAT IS CYBERSECURITY?

blog article

Oct 13, 2019

Cybersecurity, or computer security, is the protection of computer systems from the theft or damage to their hardware, software, of electric data, as well as form the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance to computer s...

Read More

Hacking Is Not a Crime! Additional Thoughts from DEFCON 2019 HACKING IS NOT A CRIME! ADDITIONAL THOUGHTS FROM DEFCON 2019

blog article

Oct 10, 2019

In my previous post, I spoke about all of the different DEFCON villages where attendees can learn about and purchase all sorts of fun hacking/counter hacking tools. Even so, I covered only a small fraction of the activities at the conference. For example, attendees have the opportunity to participat...

Read More

Defense in Depth: User-Centric Security DEFENSE IN DEPTH: USER-CENTRIC SECURITY

blog article

Oct 10, 2019

It’s impossible to create a security system that removes the user from the equation. They are integral and they have to be part of your security program. Security is defined by the individual. The minimum expectation you can have of your users is that they’ll operate in good faith. Avoid...

Read More

Unmask cybercriminals through identity attribution UNMASK CYBERCRIMINALS THROUGH IDENTITY ATTRIBUTION

blog article

Oct 08, 2019

Organized crime has grown more complex since the turn of the century—coinciding with the rise of the digital world, cybercriminals have leveraged the proliferation of technology to broaden their reach with a more sophisticated network-structured model, effectively globalizing their operations ...

Read More

How Cloud Computing is Changing Cybersecurity HOW CLOUD COMPUTING IS CHANGING CYBERSECURITY

blog article

Oct 07, 2019

As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do amazing things with web-delivered technologies. However, one of the biggest issues around the cloud has always been, and still is, cybersecurity. (Read The Truth About Cybersecurity.)The clou...

Read More

Is Your Enterprise Cyber Risk Managed Well? IS YOUR ENTERPRISE CYBER RISK MANAGED WELL?

blog article

Oct 07, 2019

In this article I want to share with you the secrets to being able to assess whether the enterprise cyber risk in your organization is being managed effectively using a simple set of questions. These are questions that will work even if you are not working in the security function – and I thin...

Read More

6 Practical Steps to Build, Execute and Scale Smarter ABM 6 PRACTICAL STEPS TO BUILD, EXECUTE AND SCALE SMARTER ABM

blog article

Oct 02, 2019

It’s hard to argue against the promises of account-based marketing (ABM). Focusing your marketing efforts on ideal accounts that are actively in the market for your products and services seems like a recipe for success in any industry. But the truth is that many ABM programs fail to achieve me...

Read More

4 Steps to Increasing Event ROI with Intent Data 4 STEPS TO INCREASING EVENT ROI WITH INTENT DATA

blog article

Oct 02, 2019

There’s no denying how valuable event marketing can be for any B2B business. Studies have shown that 84% of B2B leaders believe events are critical components of business success. But not all event marketing strategies are created equal. Without the right strategy, events can quickly become a ...

Read More

Cyber Security Awareness Month starts today CYBER SECURITY AWARENESS MONTH STARTS TODAY

blog article

Oct 01, 2019

For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year Halloween. However, it’s time not only to prepare for all things spooky. Far from it October is also a month dedicated to a subject that, if ig...

Read More

New U.N. Debate on Cybersecurity in the Context of International Security NEW U.N. DEBATE ON CYBERSECURITY IN THE CONTEXT OF INTERNATIONAL SECURITY

blog article

Sep 30, 2019

In 2018, the United Nations General Assembly voted to establish two separate groups to study international law and norms in relation to cyberspace. Resolution 73/27—proposed by a number of countries, including Russia—created an open-ended working group (OEWG) on the subject. Another grou...

Read More

Cylance is golden: BlackBerry’s new cybersecurity R&D lab is all about AI and IoT CYLANCE IS GOLDEN: BLACKBERRY’S NEW CYBERSECURITY R&D LAB IS ALL ABOUT AI AND IOT

blog article

Sep 30, 2019

BlackBerry has announced a new business unit dedicated entirely to cybersecurity research and development (R&D).The BlackBerry Advanced Technology Development Labs (BlackBerry Labs) will “operate at the forefront” of cybersecurity R&D, according to BlackBerry. The unit will be sp...

Read More

Cybercrooks Target U.S. Veterans with Fake Hiring Website CYBERCROOKS TARGET U.S. VETERANS WITH FAKE HIRING WEBSITE

blog article

Sep 25, 2019

Researchers are warning that a fake website – purporting to help U.S. military veterans search for jobs actually links to installers that download malware onto victims’ systems. The website spoofs a legitimate website for U.S. military veterans offered by the U.S. Chamber of Commerce (ht...

Read More

An Introduction to Data-driven Sales Planning AN INTRODUCTION TO DATA-DRIVEN SALES PLANNING

blog article

Sep 25, 2019

Most organizations still conduct sales planning as a manual, once-per-year exercise, due to the painful and time-consuming nature of the process. Since this is traditionally viewed as a burdensome task, it’s common that once sales plans are set in motion, companies rarely go back to evaluate a...

Read More

Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme MALICIOUS AD BLOCKERS FOR CHROME CAUGHT IN AD FRAUD SCHEME

blog article

Sep 24, 2019

‘AdBlock’ and ‘uBlock’ impersonate legitimate extensions but instead engage in cookie stuffing to defraud affiliate marketing programs, a researcher has found. Google has removed two malicious ad blockers from its Chrome Web Store after a researcher discovered they were carry...

Read More

Wait… What? Good News in Cybersecurity? WAIT… WHAT? GOOD NEWS IN CYBERSECURITY?

blog article

Sep 24, 2019

We simply don’t hear enough good news cybersecurity stories that make those involved proud. What are the cybersecurity stories that aren’t being told publicly that should be? Michael Farnum, Set Solutions, said, “If you come into the job and aren’t willing to critically revie...

Read More

4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION 4 MISTAKES THAT CAN SINK A CYBER FORENSIC INVESTIGATION

blog article

Sep 23, 2019

It is exciting to see how forensics contributes to the investigation of a cyberattack. The application of forensics in the crime scene is what we are aware of but using forensics in digital crime requires a deeper understanding. One common aspect among both is that the evidence must be secured and h...

Read More

Preparing For Physical and Cybersecurity Convergence PREPARING FOR PHYSICAL AND CYBERSECURITY CONVERGENCE

blog article

Sep 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private se...

Read More

Successful Approaches to Using Intent Data – Practical Tips from Priority Engine Users SUCCESSFUL APPROACHES TO USING INTENT DATA – PRACTICAL TIPS FROM PRIORITY ENGINE USERS

blog article

Sep 20, 2019

Increasing sales adoption of Priority Engine, incorporating its data into other systems, and measuring its success are a few key areas in which Priority Engine users commonly seek advice. We recently met with a variety of Priority Engine users and gathered their experiences tackling these common cha...

Read More

5 Tips and Tricks to Boost Small Business Security 5 TIPS AND TRICKS TO BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Many small business owners think they're safe from hackers. After all, wh...

Read More

10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ 10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ

blog article

Sep 19, 2019

GCHQ, the Government Communications Headquarters is an intelligence and security agency responsible for keeping the U.K. safe. The team of GCHQ uses cutting-edge technology, technical ingenuity, and wide-ranging partnerships to identify, analyze, and disrupt threats. GCHQ deals with real threats tha...

Read More

Cybersecurity for Distributed Energy Resources and SCADA Systems CYBERSECURITY FOR DISTRIBUTED ENERGY RESOURCES AND SCADA SYSTEMS

blog article

Sep 19, 2019

As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability coordinators to maintain a secure supply will be increasingly challenged. This document reviews the v...

Read More

5 Tips & Tricks That Boost Small Business Security 5 TIPS & TRICKS THAT BOOST SMALL BUSINESS SECURITY

blog article

Sep 19, 2019

Keep your small business safe from hackers using these cybersecurity tips. Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Ma...

Read More

What level of AI is right for your DAM? WHAT LEVEL OF AI IS RIGHT FOR YOUR DAM?

blog article

Sep 19, 2019

When you read about the artificial intelligence (AI) capabilities today’s DAM vendors offer, you’ll be faced with a myriad of choices. You’ll find everything from claims of automated, out-of-the-box AI to the ability to ‘train your own AI.’ To help make sense of these c...

Read More

Seven reasons why the Internal Combustion Engine is a dead man walking SEVEN REASONS WHY THE INTERNAL COMBUSTION ENGINE IS A DEAD MAN WALKING

blog article

Sep 18, 2019

The age of the Internal Combustion Engine (ICE) is over. Electric cars are the future. The transition has just begun, but the move from ICE vehicles to Electric will happen sooner and more quickly than most people suspect. What are the factors that lead me to say this with such confidence? However, ...

Read More

Artificial Intelligence and the Future of Jobs ARTIFICIAL INTELLIGENCE AND THE FUTURE OF JOBS

blog article

Sep 18, 2019

My role here at SAP is IoT Evangelist. It’s my job to go around and speak about how the Internet of Things is changing the way we live, work, and run our businesses. IoT Evangelist is a job title that didn’t exist 5 or 10 years ago – mainly because the Internet of Things wasn&rsquo...

Read More

AI in cyber security: a necessity or too early to introduce? AI IN CYBER SECURITY: A NECESSITY OR TOO EARLY TO INTRODUCE?

blog article

Sep 18, 2019

There is a list of growing cyber security threats, ranging from a rise in identity thefts and account takeovers to vindictive ransomware strains. Businesses are feeling the strain, especially Fortune 500 enterprises, who have massive stores of data. Because of this, they have become attractive to ba...

Read More

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond HOW AI CAN CHAMPION CYBERSECURITY IN THE INSURANCE INDUSTRY AND BEYOND

blog article

Sep 18, 2019

Over the last decade, the cybersecurity environment has undergone significant changes. But while the Internet may be vast, it isn’t necessarily becoming safer. Major data leaks from high profile companies like Equifax set a clear message that even big players are vulnerable to security breache...

Read More

Spreadsheets vs. Automation: What's Best for Sales Compensation Management? SPREADSHEETS VS. AUTOMATION: WHAT'S BEST FOR SALES COMPENSATION MANAGEMENT?

blog article

Sep 18, 2019

Spreadsheets are the most common tool used to manage data in sales organizations. In fact, more than 75% of companies rely on spreadsheets for their sales planning, forecasting, and sales compensation management. However, the business landscape is growing increasingly competitive—can tradition...

Read More

B2B Marketing Do’s and Don’ts for Attracting Leads B2B MARKETING DO’S AND DON’TS FOR ATTRACTING LEADS

blog article

Sep 16, 2019

For many B2B marketers, attracting and generating leads is often the primary goal. However, how to attract leads varies widely from company to company. While the inbound lead generation strategy should be unique to your firm, there are several best practices or do’s and don’ts for attrac...

Read More

How Cybersecurity Can Better Support Digital Transformation Business Goals HOW CYBERSECURITY CAN BETTER SUPPORT DIGITAL TRANSFORMATION BUSINESS GOALS

blog article

Sep 16, 2019

Offering outstanding user experiences and technology interfaces is vital to attracting today’s customers—they demand it. So enterprises leverage ever-growing portfolios of data and systems to differentiate those experiences from their competitors’ offerings, while also strategizing...

Read More

TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019 TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019

blog article

Sep 16, 2019

For any successful business, network systems, data, and their storage account for the most valuable digital assets and that is why such assets pose extreme breach threats causing significant business risk. In this digital age, the dependence of business on these increases their potential vulnerabili...

Read More

TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020 TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020

blog article

Sep 16, 2019

As the pace of security breaches keeps on expanding, so does the variety of attacks and the advances and procedures set up to counteract them. However, the top threats in the following couple of years will probably be from a kind of hack known to security experts today. Through 2020, 99% of vulnerab...

Read More

Is AI Worth Your DAM Time? IS AI WORTH YOUR DAM TIME?

blog article

Sep 16, 2019

Tagging based on AI enables assets to be tagged automatically upon ingestion. This smart tagging service creates tags or metadata without human intervention, saving marketers time while reducing the potential for human error. Most importantly, tagging assets or adding metadata to assets using AI imp...

Read More

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS

blog article

Sep 14, 2019

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the servic...

Read More

5 Ways Field Marketing Can Own ABM 5 WAYS FIELD MARKETING CAN OWN ABM

blog article

Sep 14, 2019

In the last few years, Account-based Marketing has taken over as a better way to engage with modern B2B buyers. When sixty-nine percent of marketers say converting leads is their top priority, a winning ABM strategy requires sound alignment between the sales and marketing functions—and, as the...

Read More

5 data privacy and cybersecurity tips for construction firms 5 DATA PRIVACY AND CYBERSECURITY TIPS FOR CONSTRUCTION FIRMS

blog article

Sep 12, 2019

No industry is immune from data privacy and cybersecurity threats, and that includes the construction industry. Here are five data privacy and cybersecurity tips construction firms should consider putting to use to protect themselves against these looming threats. The best way to protect any organiz...

Read More

Why Companies Are Forming Cybersecurity Alliances WHY COMPANIES ARE FORMING CYBERSECURITY ALLIANCES

blog article

Sep 11, 2019

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha...

Read More

These Howard County cybersecurity companies formed a biz partnership THESE HOWARD COUNTY CYBERSECURITY COMPANIES FORMED A BIZ PARTNERSHIP

blog article

Sep 11, 2019

Howard County is known for its concentration of cybersecurity companies, and now the proximity is a factor in the formation of a strategic partnership between two of the firms. Through the strategic partnership, Elkridge-based Atlantic Data Forensics (ADF) will use network security tools from Columb...

Read More

The Role of Sales in Sales Enablement THE ROLE OF SALES IN SALES ENABLEMENT

blog article

Sep 10, 2019

However, with a regular commute time that consumes a couple of hours each day, I have shifted my focus to podcasts and audiobooks. One of my favorite podcasts is the Inside Sales Enablement series by Scott Santucci and Brian Lambert. In their last episode, they spent time reviewing their thoughts an...

Read More

Implementing Buyer Enablement in Your Sales Enablement Strategy (2019) IMPLEMENTING BUYER ENABLEMENT IN YOUR SALES ENABLEMENT STRATEGY (2019)

blog article

Sep 10, 2019

The majority of the time I only had access to two TV channels, three on a good weather day, and I vividly remember when I first saw a color television. At this time, products and services were limited, and buyer choices were almost non-existent. Fast-forward to 2019. Not only do I have access to hun...

Read More

How to Increase Sales Forecasting Accuracy with Automation HOW TO INCREASE SALES FORECASTING ACCURACY WITH AUTOMATION

blog article

Sep 10, 2019

Sales forecasting is the map of estimated sales performance, revenue, and expenses that guide a sales organization in their planning processes. Having an accurate sales forecast is crucial to driving revenue, growth, and profitability. The most successful companies are consistently looking for ways ...

Read More

4 steps to address the cybersecurity skills shortage 4 STEPS TO ADDRESS THE CYBERSECURITY SKILLS SHORTAGE

blog article

Sep 09, 2019

University of Waikato’s Cybersecurity Researchers of Waikato (CROW), receives weekly requests from companies to see if personnel or students would be interested in applying for a role or an internship in cybersecurity. The government’s strategy notes that 3,445 cybersecurity incidents we...

Read More

SMBs cite security, backup & recovery as top business concerns SMBS CITE SECURITY, BACKUP & RECOVERY AS TOP BUSINESS CONCERNS

blog article

Sep 09, 2019

Small businesses around the world acknowledge that cybersecurity, backup and data recovery are important aspects of their business, but most of those businesses sit between the two lowest levels of IT maturity. The lack of maturity reflects an ongoing problem that small businesses face – the n...

Read More

Malware Attack Prompts School District Closure: K-12 Cyber Disruptions Rising MALWARE ATTACK PROMPTS SCHOOL DISTRICT CLOSURE: K-12 CYBER DISRUPTIONS RISING

blog article

Sep 09, 2019

The Flagstaff Unified School District in Arizona is just the latest to fall victm to a cybersecurity attack so disruptive it forced schools to close Thursday and Friday of last week. Schools were back in session on Monday, after the district's team worked "round the clock securing systems a...

Read More

Cybersecurity progress this way finally comes CYBERSECURITY PROGRESS THIS WAY FINALLY COMES

blog article

Sep 09, 2019

Given all the high-profile cybersecurity attacks making headlines these days, it’s easy to conclude that organizations are still not making cybersecurity a high enough priority. However, a survey of 867 senior executives conducted by Infosys representing 847 firms from 12 industries, with annu...

Read More

What will 5G mean for business cybersecurity? WHAT WILL 5G MEAN FOR BUSINESS CYBERSECURITY?

blog article

Sep 05, 2019

The coming switch to 5G cellular networks will be a boon to businesses in many ways, but it will also create a vast new “attack surface” for hackers. The main attraction to 5G — “lightning-fast” internet speeds — is also what creates the risk. Why? Because it will...

Read More

Why Artificial Intelligence Will Save Cybersecurity? WHY ARTIFICIAL INTELLIGENCE WILL SAVE CYBERSECURITY?

blog article

Sep 04, 2019

Cybersecurity is in a dire state. Massive breaches are commonplace. A few years ago, 70 million Target customers were affected by a large-scale cyber attack. Target’s CIO was immediately let go in the wake of such an unthinkable disaster. Breaches are affecting more and more citizens. Now 70 m...

Read More

Gartner names Trend Micro leader in endpoint protection platforms GARTNER NAMES TREND MICRO LEADER IN ENDPOINT PROTECTION PLATFORMS

blog article

Sep 03, 2019

Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend Micro has been named a Leader in every Gartner Magic Quadrant for this categ...

Read More

This Has Been the Worst Year for iPhone Security Yet THIS HAS BEEN THE WORST YEAR FOR IPHONE SECURITY YET

blog article

Sep 02, 2019

Earlier this month, in a dimly lit conference room in a swanky Las Vegas conference center, an Apple employee walked up on stage to pick up an award. The ceremony was the Pwnie Awards, a largely tongue in cheek affair that celebrates the best—and in other ways the worst—hacks of the year...

Read More

What is Cryptocurrency Mining Malware? WHAT IS CRYPTOCURRENCY MINING MALWARE?

blog article

Sep 02, 2019

Before we get into the details of “Cryptocurrency Mining Malware”, we need to understand first what cryptocurrency is and what miners are. What is Cryptocurrency? Cryptocurrency is best thought of as digital currency and it only exists on computers. It is transferred between peers (there...

Read More

Artificial Intelligence – Helping Cyber Security ARTIFICIAL INTELLIGENCE – HELPING CYBER SECURITY

blog article

Aug 29, 2019

Artificial Intelligence (AI) is now playing a significant role in helping to managing cyber risk. This was recently evident in the aftermath of the Nordsk Hydro ransomware attack where AI was utilised to identify further vulnerabilities. This form of automative technology would seem to be a good mat...

Read More

Two In Three Organizations To Deploy AI In Their Cyber Security System By 2020 TWO IN THREE ORGANIZATIONS TO DEPLOY AI IN THEIR CYBER SECURITY SYSTEM BY 2020

blog article

Aug 29, 2019

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, according to Capgemini Research Institute’s Reinventing Cybersecurity with Artificial Intelligence: The New Frontier in Digital Security study. Two thirds (69%) of organization...

Read More

Why must the public sector take a security by design approach? WHY MUST THE PUBLIC SECTOR TAKE A SECURITY BY DESIGN APPROACH?

blog article

Aug 29, 2019

Cyber security is a high-profile issue for UK public sector bodies, as recent news shows. Iain Shearman, Managing Director of KCOM’s National Network Services, looks at why the public sector needs to adopt security by design. It seems that nearly every week there’s some news about how UK...

Read More

A New Tool For Hackers – AI in Cybersecurity A NEW TOOL FOR HACKERS – AI IN CYBERSECURITY

blog article

Aug 28, 2019

The dawn of the internet and advances in computing means we’re able to trigger an exact solution to complex problems in diverse areas - ranging from astrophysics and biological systems to automation and precision. But at the same time, these systems are inherently vulnerable to cyber threats. ...

Read More

Why testing user behaviour is crucial to your cyber security WHY TESTING USER BEHAVIOUR IS CRUCIAL TO YOUR CYBER SECURITY

blog article

Aug 28, 2019

Cyberattacks and security breaches have become so widespread that companies are now spending billions of dollars collectively to deal with these threats. Falling victim to attacks such as an advanced persistent threat or a malware attack can cause irreparable damage to their businesses and reputatio...

Read More

How AI Is Changing The Cyber-Security Landscape HOW AI IS CHANGING THE CYBER-SECURITY LANDSCAPE

blog article

Aug 27, 2019

The use of Artificial Intelligence (AI) has enhanced not only the delivery of services but also improved cybersecurity. It’s estimated that 15% of organizations globally have adopted AI technology in their operations. However, the use of technology has both positive and negative consequences f...

Read More

Can VMware become a leading cybersecurity vendor? CAN VMWARE BECOME A LEADING CYBERSECURITY VENDOR?

blog article

Aug 27, 2019

When you think about VMware and cybersecurity, two products have always stood out. NSX, which has evolved into a common micro-segmentation tool for east/west traffic within ESXi, and AppDefense, which monitors applications, determines “normal” behavior, and detects anomalies. Now, VMware...

Read More

CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY? CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY?

blog article

Aug 26, 2019

As the new-age technologies have disrupted the IT industry, several trending topics grab the attention regularly. The automation of mundane and repetitive tasks has become an essential dose for progressive companies. It releases the workforce from such task and directs them towards more creative wor...

Read More

Ransomware threat raises National Guard RANSOMWARE THREAT RAISES NATIONAL GUARD'S ROLE IN STATE CYBERSECURITY

blog article

Aug 26, 2019

National Guard units already play a large role in state governments’ cybersecurity activities, such as protecting election systems, but the threat of ransomware to cripple a state or city organization is a growing concern for uniformed personnel, the top military official overseeing the Nation...

Read More

What Is a Zero-Trust Model in Cybersecurity, and What Does It Mean for Federal IT? WHAT IS A ZERO-TRUST MODEL IN CYBERSECURITY, AND WHAT DOES IT MEAN FOR FEDERAL IT?

blog article

Aug 23, 2019

Cybersecurity is a perennial concern inside federal agencies, but the conversation is starting to evolve. In the past, perimeter-based IT security defenses were a major area of investment — keeping malicious actors out of networks and away from sensitive data. Increasingly, the cybersecurity l...

Read More

What’s the Difference Between Antivirus and Endpoint Security? WHAT’S THE DIFFERENCE BETWEEN ANTIVIRUS AND ENDPOINT SECURITY?

blog article

Aug 22, 2019

What’s the difference between antivirus and endpoint security? Why should your enterprise case? How should it affect your enterprise cybersecurity solution decisions? Indeed, the difference between antivirus and endpoint security looks almost indistinguishable from a distance. In fact, antivir...

Read More

The Impact of Artificial Intelligence on Cyber Security THE IMPACT OF ARTIFICIAL INTELLIGENCE ON CYBER SECURITY

blog article

Aug 22, 2019

There is currently a big debate raging about whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life. With more and more enterprises using AI for their needs, it’s time to analyze the possible impacts of the implementation of AI in the cyber security fi...

Read More

Why Behavioral Analytics Matter to Enterprise Cybersecurity WHY BEHAVIORAL ANALYTICS MATTER TO ENTERPRISE CYBERSECURITY

blog article

Aug 22, 2019

Why do behavioral analytics matter so much for your enterprise’s cybersecurity? In fact, what even are behavioral analytics? Which threats can it detect most easily? Why do those threats pose the most danger to your business? Your enterprise network continues to scale as more users connect to ...

Read More

Artificial Intelligence: A Tool or a Threat to Cybersecurity? ARTIFICIAL INTELLIGENCE: A TOOL OR A THREAT TO CYBERSECURITY?

blog article

Aug 21, 2019

Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsic value to both businesses and consumers. Since business operations have become smarter with technology, so ...

Read More

Creating Content That Improves CX: A Q&A with Lionbridge & Aprimo CREATING CONTENT THAT IMPROVES CX: A Q&A WITH LIONBRIDGE & APRIMO

blog article

Aug 21, 2019

Today’s brands face numerous challenges. They need to create a customized, excellent experience for each and every customer worldwide. To do that, they need to create high-quality, on-target content. They need to create that content quickly, effectively, and for audiences who speak multiple la...

Read More

CyberRisk Alliance acquires Cybersecurity Collaborative CYBERRISK ALLIANCE ACQUIRES CYBERSECURITY COLLABORATIVE

blog article

Aug 21, 2019

Cybersecurity and business intelligence company CyberRisk Alliance recently acquired Cybersecurity Collaborative, a peer council platform for Chief Information Security Officers (CISOs). Cybersecurity Collaborative is a private cross-industry forum for CISOs and security professionals devoted to pee...

Read More

Going Global 101: How Your Competition Can Be Your Best Resource GOING GLOBAL 101: HOW YOUR COMPETITION CAN BE YOUR BEST RESOURCE

blog article

Aug 20, 2019

Lace-up your sneakers and step up to the starting line: you’re ready to reach countless customers in new markets. You’ve secured your spot in the Global Marketplace (whether by default or design). But before you sprint away, take a good look around you. You are not alone in this race. Yo...

Read More

Three Common Email Security Mistakes That MSPs Make THREE COMMON EMAIL SECURITY MISTAKES THAT MSPS MAKE

blog article

Aug 20, 2019

MSPs can generate recurring revenue by being proactive about educating customers about email threats and how to defeat them—if they avoid three common mistakes. Businesses have come to rely on cloud email and file-sharing applications for communication and productivity. But, too often, they as...

Read More

Microsoft® Tightens Partner Network Security Requirements with MFA MICROSOFT® TIGHTENS PARTNER NETWORK SECURITY REQUIREMENTS WITH MFA

blog article

Aug 20, 2019

In the last few months, Microsoft® has been ruffling their Partners’ feathers by proposing a series of startling changes to their Partner Network. Following a failed attempt to cut internal use rights (IUR) support for smaller MSPs, Microsoft has recently tightened restrictions on their Pa...

Read More

Why cybersecurity is a central ingredient in evolving digital business models WHY CYBERSECURITY IS A CENTRAL INGREDIENT IN EVOLVING DIGITAL BUSINESS MODELS

blog article

Aug 19, 2019

About the only thing shifting as fast as the cyber threat landscape is the typical enterprise’s org chart. As enterprises aim to keep pace with the rapidly evolving digital economy, many are restructuring internal departments, hiring criteria and the processes by which they develop and distrib...

Read More

What can we do about public-sector security breaches? WHAT CAN WE DO ABOUT PUBLIC-SECTOR SECURITY BREACHES?

blog article

Aug 19, 2019

Just as the sun comes up every morning, cybercriminals continually change their tactics to counter the latest defenses. This tactic was highlighted in the annual Verizon Data Breach Investigations Report, which described the changing face of cybersecurity threats. For public-sector organizations, on...

Read More

Rebuilding Your Brand’s Reputation After A Cyber Attack REBUILDING YOUR BRAND’S REPUTATION AFTER A CYBER ATTACK

blog article

Aug 18, 2019

It is estimated that one cyber attack occurs every 39 seconds, with millions of records being stolen daily. According to IT Governance USA, some of the most common attacks include malware, phishing, distributed denial-of-service attacks, SQL injection, and ‘man-in-the-middle’ (MITM). Tak...

Read More

Role of Artificial Intelligence in Data Security ROLE OF ARTIFICIAL INTELLIGENCE IN DATA SECURITY

blog article

Aug 18, 2019

Just the way the deficiency of vitamin and poor hygiene can make the human body fell seriously ill, the deficient access points and lack of hygiene in cyber environments can lead to cyberattacks in the hyper-connected workplaces. The likelihood of cyberattacks is increasing with continuous balloonin...

Read More

US Cyber Command has publicly posted malware linked to a North Korea hacking group US CYBER COMMAND HAS PUBLICLY POSTED MALWARE LINKED TO A NORTH KOREA HACKING GROUP

blog article

Aug 15, 2019

U.S. Cyber Command, the sister division of the National Security Agency focused on offensive hacking and security operations, has released a set of new samples of malware linked to North Korean hackers. The military unit tweeted Wednesday that it had uploaded the malware to VirusTotal, a widely used...

Read More

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope BLACK HAT 2019: 3 CYBERSECURITY CONCERNS AND 3 THINGS THAT GIVE HOPE

blog article

Aug 15, 2019

Organizations worry more about the volume and sophistication of cyber attacks and are confused about what tools to use. It's not all bad news, though, as this year's Black Hat highlighted several security advancements, including greater emphasis on application security and automating securit...

Read More

DIVERSE VOICES STRENGTHEN BRAND CHARACTER DIVERSE VOICES STRENGTHEN BRAND CHARACTER

blog article

Aug 14, 2019

What character appears in the most films and television programs? Dracula? God? Santa Claus? All of those make the top ten list, but none is the correct answer. Satan (or The Devil) is a character is more than 840 projects – more than any other character. If you limit the list to mortals, the ...

Read More

CX IN THE AGE OF PRIVACY AND TRUST, PART 3: CAN WE (RE)BUILD TRUST? CX IN THE AGE OF PRIVACY AND TRUST, PART 3: CAN WE (RE)BUILD TRUST?

blog article

Aug 14, 2019

This is the third in a series of articles on creating, maintaining, and optimizing great customer experiences in the context of mounting concerns about privacy and increasingly strict regulations governing data processing. We address topics such as consent strategies, the role of trust, the elements...

Read More

Cyber security: Breaching the mobile phone security perimeter CYBER SECURITY: BREACHING THE MOBILE PHONE SECURITY PERIMETER

blog article

Aug 14, 2019

The global security and privacy revolution has catapulted the process of managing, storing and exchanging data to unprecedented levels. According to a GSMA report, over 5 billion people globally are connected to mobile devices right now. App downloads are soaring—2018 was estimated to have ove...

Read More

Apple Expands Bug Bounty; Raises Max Reward to $1 Million APPLE EXPANDS BUG BOUNTY; RAISES MAX REWARD TO $1 MILLION

blog article

Aug 12, 2019

Apple is opening up its bug bounty program to more researchers, increasing the potential rewards and expanding the pool of qualifying products in a bid to attract tips on critical software flaws. Ivan Krstić, head of Apple's security engineering and architecture, announced the changes last week ...

Read More

Automakers warm up to friendly hackers at cybersecurity conference AUTOMAKERS WARM UP TO FRIENDLY HACKERS AT CYBERSECURITY CONFERENCE

blog article

Aug 11, 2019

At a conference where hackers can try their hand at picking locks and discover cyber vulnerabilities in a makeshift hospital, they can also endeavor to break into the control units of cars and take over driving functions. Those efforts at the DEF CON security convention in Las Vegas this weekend are...

Read More

3 Fundamental Items To Have Web Security 3 FUNDAMENTAL ITEMS TO HAVE WEB SECURITY

blog article

Aug 10, 2019

Running a website is not easy from the standpoint of security and privacy. All web publishers are making a delicate balance between cost and security technologies, the more cyber defense ready the site, the higher the cost of running them. Any web developers worth his salt knows very well that TLS c...

Read More

Cyberattacks find easy target in nation CYBERATTACKS FIND EASY TARGET IN NATION'S SCHOOLS

blog article

Aug 09, 2019

School districts across the country are increasingly becoming a major target of malicious cyberattacks, leaving both the federal government and state governments scrambling to find ways to fight back. Recent cyberattacks on school districts in Louisiana, Virginia and Oklahoma have highlighted the th...

Read More

How to Recover from a Cyber Attack HOW TO RECOVER FROM A CYBER ATTACK

blog article

Aug 08, 2019

In part four of the MEP National Network five-part series on “Cybersecurity for Manufacturers,” we covered how to respond quickly to an information security breach with a prepared plan of action. Now we’ll explore effective mechanisms for restoring operations after a cybersecurity ...

Read More

How to Detect a Cyber Attack Against Your Company HOW TO DETECT A CYBER ATTACK AGAINST YOUR COMPANY

blog article

Aug 08, 2019

This article is the third installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.S...

Read More

Rebuilding Trust After Cybersecurity Lapses REBUILDING TRUST AFTER CYBERSECURITY LAPSES

blog article

Aug 08, 2019

Trust is a business fundamental, and cybersecurity lapses can rattle the trust of important constituencies. Customers avoid buying from companies they don’t trust. Investors and employees worry about their prospects and livelihoods. Security managers worry about future incidents. Even communit...

Read More

SOCIAL MEDIA VISIBLE THREATS – ARE YOU STILL IGNORING THEM? SOCIAL MEDIA VISIBLE THREATS – ARE YOU STILL IGNORING THEM?

blog article

Aug 07, 2019

How social are you? Today, the answer to this question is defined by the number of social media accounts you own and the amount of time that you spend online. We find everyone active on social media in some form. Even businesses are implementing social media strategies actively to connect with their...

Read More

AI for Cybersecurity in Banking – Where Banks Are Investing Today AI FOR CYBERSECURITY IN BANKING – WHERE BANKS ARE INVESTING TODAY

blog article

Aug 06, 2019

Hackers are cyberattackers are using more sophisticated methods to break into digital networks; they themselves have also started employing artificial intelligence techniques to bypass detection systems. Cyberthreats can compromise enterprise networks at a greater speed than ever before, and cyberse...

Read More

Millions of Android Smartphones Vulnerable to Trio of Qualcomm Bugs MILLIONS OF ANDROID SMARTPHONES VULNERABLE TO TRIO OF QUALCOMM BUGS

blog article

Aug 06, 2019

Flaws in Qualcomm chipset expose millions of Android devices to hacking threat. Security researchers from Tencent’s Blade Team are warning Android smartphone and tablet users of flaws in Qualcomm chipsets, called QualPwn. The bugs collectively allow hackers to compromise Android devices remote...

Read More

How to Recognize A Hacked Laptop Camera? HOW TO RECOGNIZE A HACKED LAPTOP CAMERA?

blog article

Aug 05, 2019

A laptop is a portable computer that is small-sized and thin to be carried around for personal work. Its features can be used for different purposes, one of them being the laptop camera that is used for taking photos, video calls in Facebook or Whats App if you are into a long-distance relationship ...

Read More

4 Easy Ways to Thwart Hackers and Scammers 4 EASY WAYS TO THWART HACKERS AND SCAMMERS

blog article

Aug 05, 2019

Hackers and scammers are a growing threat in a world increasingly dependent on the World Wide Web. The IoT has given internet access to billions of people around the globe which has increased the exposure to unsecured and dangerous connections. While the IoT has been undoubtedly beneficial, the risk...

Read More

How to Protect Your Business from Cyber Attacks HOW TO PROTECT YOUR BUSINESS FROM CYBER ATTACKS

blog article

Aug 05, 2019

This article is the second installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U....

Read More

For Cybersecurity, Size Doesn’t Matter FOR CYBERSECURITY, SIZE DOESN’T MATTER

blog article

Aug 05, 2019

Las Vegas—Small pharmacies, whether focused on specialty, home infusion or other trade channel, should not believe that because of their size, they are not at risk for cyber threats. Organizations without the finances and on-site information technology expertise to ensure the security of their...

Read More

What is ethical hacking? A guide to white-hat attacks and penetration tests WHAT IS ETHICAL HACKING? A GUIDE TO WHITE-HAT ATTACKS AND PENETRATION TESTS

blog article

Aug 05, 2019

It sounds crazy to the uninitiated, but organisations across the globe pay people to break into their systems and find sensitive information. The reason they do this is simple: to catch a thief, you must think like one. Organisations hire ethical hackers to make sure they have someone who’s on...

Read More

MOBILE ANTIVIRUS AS MUCH OF A THREAT AS MALWARE MOBILE ANTIVIRUS AS MUCH OF A THREAT AS MALWARE

blog article

Aug 04, 2019

With an estimated 2.71 billion smartphone users worldwide, you may be surprised to find out that your phone probably a security risk to you. New research has shown that the Android system, in particular, has a massive security problem. Before you close this post comfortable in knowing that you have ...

Read More

What is cryptojacking? How to prevent, detect, and recover from it WHAT IS CRYPTOJACKING? HOW TO PREVENT, DETECT, AND RECOVER FROM IT

blog article

Aug 02, 2019

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a website or online ad with JavaScript code that auto-exe...

Read More

Inside Viasat’s Cyber Security Operations Center INSIDE VIASAT’S CYBER SECURITY OPERATIONS CENTER

blog article

Aug 01, 2019

Viasat’s growing CSOC offers cybersecurity to government and private sector customers in the U.S. and beyond. The modern battlespace is all about combined arms. All the various weapons of war – infantry, tanks, artillery, aircraft – must operate in tight coordination, enhancing eac...

Read More

Why Complexity Issues Persist in SIEM and Cybersecurity WHY COMPLEXITY ISSUES PERSIST IN SIEM AND CYBERSECURITY

blog article

Aug 01, 2019

Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They ...

Read More

Cybersecurity for Startups: How to Protect Your Business CYBERSECURITY FOR STARTUPS: HOW TO PROTECT YOUR BUSINESS

blog article

Aug 01, 2019

Large-scale data breaches, such as the Equifax hack, are ubiquitous nowadays. But if you think that breaches only affect high-profile companies, then you are mistaken. In fact, three out of five small- and medium-sized enterprises (SMEs) have fallen victim to a cyber attack. Many small businesses th...

Read More

Cybersecurity: Are your passwords stored securely CYBERSECURITY: ARE YOUR PASSWORDS STORED SECURELY

blog article

Aug 01, 2019

The use of malware designed to harvest consumers’ digital data—known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users, targeted by the stealers, peaked from less than 6,00,000 in the first half of 2018 to over 9,40...

Read More

6 Challenges In Using Open Source Cybersecurity Tools 6 CHALLENGES IN USING OPEN SOURCE CYBERSECURITY TOOLS

blog article

Jul 31, 2019

When it comes to cybersecurity, tools and infrastructure matter a lot in order to battle notorious threats. Companies across the world have of late understood the importance of having strong cybersecurity and are trying every possible tool or software to make it better. There are two types of tools ...

Read More

The Importance of Cyber-Security in Modern Internet Age THE IMPORTANCE OF CYBER-SECURITY IN MODERN INTERNET AGE

blog article

Jul 30, 2019

Today every person of the globe connects the World Wide Web daily. Even those who do not have accounts on social platforms can be attacked by hackers. How? Nowadays all banks store information about each client in computers and on clouds. It simplifies things and fastens banking service. People like...

Read More

What to Consider When Developing a Cybersecurity Strategy WHAT TO CONSIDER WHEN DEVELOPING A CYBERSECURITY STRATEGY

blog article

Jul 30, 2019

In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach co...

Read More

How to Identify Your Company’s Cybersecurity Risks HOW TO IDENTIFY YOUR COMPANY’S CYBERSECURITY RISKS

blog article

Jul 30, 2019

According to a 2018 IBM-sponsored study by the Ponemon Institute, the global average for a data breach is $3.86 million. That breaks down to almost $150 per stolen record. If you’re a small or medium-sized manufacturer, you may not think statistics like these apply to you. But out of 17 indust...

Read More

5G Networks and the Impetus for Cybersecurity Protection at the Gateway 5G NETWORKS AND THE IMPETUS FOR CYBERSECURITY PROTECTION AT THE GATEWAY

blog article

Jul 29, 2019

5G networks are the talk of the mobile world, with a few test markets already available in the US and the UK. The launch of 5G networks marks a sea change in greater global connectivity and a radical departure from the traditional network connectivity of the past. It also opens up a range of urgent ...

Read More

5 cybersecurity threats you should be concerned about right nows 5 CYBERSECURITY THREATS YOU SHOULD BE CONCERNED ABOUT RIGHT NOWS

blog article

Jul 29, 2019

Cybersecurity threats to small- and mid-sized businesses are not only getting more sophisticated, they’re also intensifying. Organizations that would have seen one attack a year are now experiencing them on a weekly or monthly basis. As the threat landscape changes, businesses need to evolve q...

Read More

Design competition to create graphics to illustrate cybersecurity stories DESIGN COMPETITION TO CREATE GRAPHICS TO ILLUSTRATE CYBERSECURITY STORIES

blog article

Jul 29, 2019

Illustrating abstract articles is a pain in the ass, and in the age of social media, a post without an illustration is likely to disappear without attaining any kind of readership, which leaves those of us who cover the field endlessly remixing HAL9000 eyes using walls of code, Matrix text-waterfall...

Read More

Overcoming Security Challenges With An Integrated Approach OVERCOMING SECURITY CHALLENGES WITH AN INTEGRATED APPROACH

blog article

Jul 28, 2019

What do Chief information Security Officers (CISOs) have in common? Staying ahead or even keeping pace with the increasingly sophisticated threats, overly complex defenses, and new regulations that are affecting the cyber security industry. Organisations face threats in many forms and sizes. And som...

Read More

Email attacks having a major impact on businesses: study EMAIL ATTACKS HAVING A MAJOR IMPACT ON BUSINESSES: STUDY

blog article

Jul 28, 2019

Email attacks are having a major impact on businesses around the world and impacting the personal lives of IT security professionals, with a new study finding that phishing and ransomware attacks are the most significant concern for the IT professionals. The survey commissioned by cloud security and...

Read More

Cybersecurity Firm Drops Code for the Incredibly Dangerous Windows BlueKeep Vulnerability CYBERSECURITY FIRM DROPS CODE FOR THE INCREDIBLY DANGEROUS WINDOWS BLUEKEEP VULNERABILITY

blog article

Jul 26, 2019

Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep. In May, Microsoft released a patch for a bug in several versions of Windows that is so bad that the company felt it even had to release a fix for Windows XP, an operati...

Read More

Cyber Security In The Age Of Artificial Intelligence (AI) – OpEd CYBER SECURITY IN THE AGE OF ARTIFICIAL INTELLIGENCE (AI) – OPED

blog article

Jul 25, 2019

In a constantly progressing cyber threat landscape where antivirus software and firewalls are considered tools of antiquity, organizations are now looking for more technologically advanced means of safeguarding classified and sensitive information. Artificial intelligence (AI) is taking the position...

Read More

5 Tips To Prevent Cyber Security Attacks on Your Organization 5 TIPS TO PREVENT CYBER SECURITY ATTACKS ON YOUR ORGANIZATION

blog article

Jul 24, 2019

No doubt, the internet is very beneficial for almost everyone in all aspects. Unfortunately, access to a vast amount of information has enabled an increase in the number of cyber crime activities. Today, cyber attackers not only stalk the large corporations, on the contrary, but startups or smaller ...

Read More

Personal Medical Devices Recalled For Hacking Risk PERSONAL MEDICAL DEVICES RECALLED FOR HACKING RISK

blog article

Jul 23, 2019

The US Food and Drug Administration (FDA) has issued a warning to patients and healthcare providers that certain Medtronic MiniMed some insulin pumps carry cybersecurity risks. The alert reads, in part, as follows: "The FDA has become aware than an unauthorized person (someone other than a pati...

Read More

Strengthening cyber security expertise in Georgia STRENGTHENING CYBER SECURITY EXPERTISE IN GEORGIA

blog article

Jul 23, 2019

Security of digital information is a major societal challenge. Georgia is keeping up with the global trend of developing cyber-security and interest in this field is noticeably increasing. GRENA, the Georgian Research and Educational Networking Association, is working with CERT.GOV.GE – the Ge...

Read More

Government Creates Security Framework for the UK Telecoms Sector GOVERNMENT CREATES SECURITY FRAMEWORK FOR THE UK TELECOMS SECTOR

blog article

Jul 23, 2019

The Government has concluded its Telecoms Supply Chain Review and plans to establish new Telecoms Security Requirements, which will be underpinned by a legislative framework that hands stronger enforcement powers to Ofcom in order to “protect” UK full fibre (FTTP) broadband and 5G networ...

Read More

How to Create a Tax Data Security Plan HOW TO CREATE A TAX DATA SECURITY PLAN

blog article

Jul 23, 2019

Professional tax preparers are being reminded that federal law requires them to create a written information security plan to protect their clients’ data. As such, the IRS and its Security Summit partners are urging tax professionals to take time this summer to review their data security prote...

Read More

How effective encryption achieves data security and functionality in the cloud HOW EFFECTIVE ENCRYPTION ACHIEVES DATA SECURITY AND FUNCTIONALITY IN THE CLOUD

blog article

Jul 23, 2019

While the growing popularity of public cloud applications has fundamentally changed the way in which many businesses operate, it has also created a number of previously unseen data security and compliance issues. This has happened because many of the most popular cloud applications provide very litt...

Read More

Security In and On the Application SECURITY IN AND ON THE APPLICATION

blog article

Jul 22, 2019

security seems to be passing through various phases as a topic. It started as, “Wait, what? I need security? But why???” Frankly, we probably haven’t moved completely out of that one, but we’ve made progress. Next comes, “What does security mean?” And that continu...

Read More

How to build a comprehensive cyber security strategy HOW TO BUILD A COMPREHENSIVE CYBER SECURITY STRATEGY

blog article

Jul 21, 2019

Most, if not all businesses know the importance of protecting themselves against cyber threats. If your organisation is breached the consequences can be serious, both reputationally and – thanks to GDPR – financially. Therefore, it's important to have an effective cyber strategy, but...

Read More

Columbia cybersecurity team to compete on national stage COLUMBIA CYBERSECURITY TEAM TO COMPETE ON NATIONAL STAGE

blog article

Jul 21, 2019

One of the best collegiate Cybersecurity teams in the country is found in Columbia and they are getting ready for a big national competition. Their team, ‘D0wn The L1ne,’ has been practicing for the event at their Columbia Campus of ECPI University. They are headed to Las Vegas to be a p...

Read More

How to handle the legal implications of a data breach HOW TO HANDLE THE LEGAL IMPLICATIONS OF A DATA BREACH

blog article

Jul 19, 2019

Running a business today is not the same as it was several years ago. With technology picking up by the minute, business people now have multiple choices of digital solutions that can help them manage payroll, human resources, customers and even finances efficiently, but they have also opened up mor...

Read More

Anatomy of a spear phishing attack – with example scam ANATOMY OF A SPEAR PHISHING ATTACK – WITH EXAMPLE SCAM

blog article

Jul 18, 2019

With cyber crime quickly becoming a top priority for organisations, IT admins have felt the pressure to invest in network defences and ensure their systems aren’t breached. But those measures aren’t much help when criminals use phishing scams to bypass organisations’ defences and h...

Read More

Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void THREAT SPOTLIGHT: SODINOKIBI RANSOMWARE ATTEMPTS TO FILL GANDCRAB VOID

blog article

Jul 18, 2019

Sodinokibi ransomware, also known as Sodin and REvil, is hardly three months old, yet it has quickly become a topic of discussion among cybersecurity professionals because of its apparent connection with the infamous-but-now-defunct GandCrab ransomware. Detected by Malwarebytes as Ransom.Sodinokibi,...

Read More

Singapore 11th for cyber threats sources, says Kaspersky SINGAPORE 11TH FOR CYBER THREATS SOURCES, SAYS KASPERSKY

blog article

Jul 17, 2019

Kaspersky’s latest data from Kaspersky Security Network (KSN) has uncovered more than two million incidents which originated from servers located in Singapore in the second quarter of 2019. This places Singapore at 11th place globally when it comes to locations with the most number of incident...

Read More

Artificial intelligence in cyber security: The savior or enemy of your business? ARTIFICIAL INTELLIGENCE IN CYBER SECURITY: THE SAVIOR OR ENEMY OF YOUR BUSINESS?

blog article

Jul 17, 2019

Artificial intelligence poses both a blessing and a curse to businesses, customers, and cybercriminals alike. AI technology is what provides us with speech recognition technology (think Siri), Google’s search engine, and Facebook’s facial recognition software. Some credit card companies ...

Read More

New cyberthreats require new ways to protect democracy NEW CYBERTHREATS REQUIRE NEW WAYS TO PROTECT DEMOCRACY

blog article

Jul 17, 2019

Starting today at the Aspen Security Forum we’re demonstrating the first voting system running Microsoft ElectionGuard as an example of how ElectionGuard can enable a new era of secure, verifiable voting. The demo shows how it’s also possible to make voting more accessible for people wit...

Read More

How Electric Utilities Can Reduce Their Cyber Risk HOW ELECTRIC UTILITIES CAN REDUCE THEIR CYBER RISK

blog article

Jul 17, 2019

A successful cyberattack against the electric grid could have enormous consequences that would ripple throughout other industries. In a January 2019 report, “Managing Cyber Risk in the Electric Power Sector,” Deloitte notes that energy is one of 16 critical infrastructure sectors identif...

Read More

Cybersecurity Tools for CPAs CYBERSECURITY TOOLS FOR CPAS

blog article

Jul 16, 2019

In a speech at Baruch College’s 18th Annual Financial Reporting Conference, PCAOB member Kathleen Hamm stated: “Technology offers the promise of combining increased efficiencies with improved effectiveness, resulting in enhanced audit quality” (May 2, 2019, http://bit.ly/2HNfgxa). ...

Read More

Businesses need AI to beef up cybersecurity BUSINESSES NEED AI TO BEEF UP CYBERSECURITY

blog article

Jul 15, 2019

A lot of businesses are unable to respond quickly to cyberattacks. In many cases they feel simply overwhelmed by the sheer number of data points they need to monitor for intrusion. These were some of the key findings from a new report from the Capgemini Research Institute, but it’s not all doo...

Read More

Artificial Intelligence: A new frontier in cybersecurity ARTIFICIAL INTELLIGENCE: A NEW FRONTIER IN CYBERSECURITY

blog article

Jul 15, 2019

Security experts opined that more organizations are turning up to Artificial Intelligence (AI) to shore up their security defenses against cybercrimes. Technology firm Capgemini stated that firms find AI as increasingly necessary to bolster cybersecurity. In its research, Reinventing Cybersecurity w...

Read More

Meet Extenbro, a new DNS-changer Trojan protecting adware MEET EXTENBRO, A NEW DNS-CHANGER TROJAN PROTECTING ADWARE

blog article

Jul 15, 2019

Recently, we uncovered a new DNS-changer called Extenbro that comes with an adware bundler. These DNS-changers block access to security-related sites, so the adware victims can’t download and install security software to get rid of the pests. From our viewpoint, this might be like sending in a...

Read More

AI Could Escalate New Type Of Voice Phishing Cyber Attacks AI COULD ESCALATE NEW TYPE OF VOICE PHISHING CYBER ATTACKS

blog article

Jul 15, 2019

Earlier this week, the Israel National Cyber Directorate (INCD) issued a warning of a new type of cyber-attack that leverages artificial intelligence technology to impersonate senior enterprise executives. The method instructs company employees to perform transactions including money transfers and o...

Read More

How to get specific security information about AWS services HOW TO GET SPECIFIC SECURITY INFORMATION ABOUT AWS SERVICES

blog article

Jul 15, 2019

We are excited to announce the launch of dedicated security chapters in the AWS documentation for over 40 services. Security is a key component of your decision to use the cloud. These chapters can help your organization get in depth information about both the built in and the configurable security ...

Read More

SailPoint Levels-Up their ABM Strategy with Intent Data SAILPOINT LEVELS-UP THEIR ABM STRATEGY WITH INTENT DATA

blog article

Jul 15, 2019

The buyer’s journey has changed in a way which leaves many sales and marketing teams struggling to find insight from within what we call the Dark Funnel. However, many technology companies are starting to build solutions to address the radical new way customers engage and buy today by collecti...

Read More

Duo Security Sets BDRs up for Success with 6sense DUO SECURITY SETS BDRS UP FOR SUCCESS WITH 6SENSE

blog article

Jul 15, 2019

The role of a Business Development Rep can be a daunting one. Knowing where to prioritize when you have over 1,000 accounts and knowing what content to reach out to them and engage them with can be an impossible task. But if you have the right intent data that can show you where the account is in th...

Read More

Mitigation Strategies for Cyber Attacks at Your Small Business MITIGATION STRATEGIES FOR CYBER ATTACKS AT YOUR SMALL BUSINESS

blog article

Jul 15, 2019

If you’re wondering how to protect your small business against a cyber attack, you’re not alone. Almost 60% of cyber attack victims are small businesses, and within two years of the first attack, the likelihood that a small business will experience another is approximately 28%. In respon...

Read More

Cyber Security: What You Need to Know to Face the Inevitable CYBER SECURITY: WHAT YOU NEED TO KNOW TO FACE THE INEVITABLE

blog article

Jul 14, 2019

The question is not whether a cyber breach will occur – it’s when and how to best mitigate its negative impacts. While the massive malware attacks like WannaCry or NotPetya garner all the headlines, these are relative rarities in cybercrime. Joe Scargill, U.S. Secret Service Agent, expla...

Read More

Clemson and other universities work to improve cybersecurity CLEMSON AND OTHER UNIVERSITIES WORK TO IMPROVE CYBERSECURITY

blog article

Jul 14, 2019

CLEMSON - This spring, a batch of tests were sent to 100 Clemson University faculty and staff emails in an attempt to access private and personal information. A fourth of the emails were blocked by the security system, and several additional recipients alerted the university to the phishing attempt....

Read More

Unusual Linux Ransomware Targets NAS Servers UNUSUAL LINUX RANSOMWARE TARGETS NAS SERVERS

blog article

Jul 12, 2019

A rare instance of ransomware targeting Linux-based file storage systems (network-attached storage servers, specifically) has been spotted, spreading via 15 separate but related campaigns. The adversaries behind the effort are continuing their depredations on an ongoing basis, according to researche...

Read More

NATO Satellites Are At Risk of Cyber Attack NATO SATELLITES ARE AT RISK OF CYBER ATTACK

blog article

Jul 12, 2019

Military satellites are in critical threat of being attacked by malicious actors. As the threat of nation-states and hackers increases, security experts have become concerned with the attack on our infrastructure in space. The U.S and its Allies depend on satellites for military, intelligence gather...

Read More

The Importance of Computer Security THE IMPORTANCE OF COMPUTER SECURITY

blog article

Jul 11, 2019

Computer security tactics aren't often thought about until a problem arises—and at that point, a break in security can cause harmful and potentially major issues. Because we all want to keep our computers and information safe, we have answers to some frequently asked questions about potent...

Read More

AGENT SMITH MALWARE THAT SECRETLY REPLACES WHATSAPP SPREADS TO 25 MILLION PHONES AGENT SMITH MALWARE THAT SECRETLY REPLACES WHATSAPP SPREADS TO 25 MILLION PHONES

blog article

Jul 11, 2019

A new type of mobile malware that secretly replaces popular apps like WhatsApp on people’s phones has already infected more than 25 million devices, security researchers have revealed. Dubbed ‘Agent Smith’, the malware exploits vulnerabilities within the Android operating system to...

Read More

ZEEK-BASED SECURITY DETECTION & MITIGATION ZEEK-BASED SECURITY DETECTION & MITIGATION

blog article

Jul 11, 2019

Today, there are many open-source software projects that provide incredible value to solving a myriad of problems for security detection and mitigation, but not all frameworks necessarily translate from conception into operation easily. Zeek is different. Rooted in 20 years of research, Zeek, an ope...

Read More

6 Ways to Take Your Agency’s Application Security Program to the Next Level 6 WAYS TO TAKE YOUR AGENCY’S APPLICATION SECURITY PROGRAM TO THE NEXT LEVEL

blog article

Jul 11, 2019

If your agency has already implemented some form of application security, you’re already ahead of the curve. But your program may still have room for improvement. To help you take your application security (AppSec) program to the next level, we’ve put together this list of best practices...

Read More

Cyber Truth or Cyber Myth? CYBER TRUTH OR CYBER MYTH?

blog article

Jul 10, 2019

As if trying to assemble a successful cybersecurity department were not difficult enough, one of the hardest battles we all find ourselves fighting is the one against well-meaning but often misleading information. Sometimes the information is wrong, but more often it is right … but only when ...

Read More

A peek into malware analysis tools A PEEK INTO MALWARE ANALYSIS TOOLS

blog article

Jul 09, 2019

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of...

Read More

Executives’ Changing Views on Cybersecurity EXECUTIVES’ CHANGING VIEWS ON CYBERSECURITY

blog article

Jul 09, 2019

What does the shift in how cybersecurity is viewed by senior executives within organizations mean? To find out, Radware surveyed more than 260 executives worldwide and discovered that cybersecurity has moved well beyond the domain of the IT department and is now the direct responsibility of senior e...

Read More

Why Cyber Security Exercises Work: Three Real World Examples WHY CYBER SECURITY EXERCISES WORK: THREE REAL WORLD EXAMPLES

blog article

Jul 09, 2019

Cyber security exercises have become more prevalent in recent years. Despite this, many people are not familiar with them. In today's blog on why cyber security exercises work, we'll give you three real world examples you can learn from and possibly apply to your situation. Exercises are use...

Read More

Cybersecurity Considerations for IoT Product Design CYBERSECURITY CONSIDERATIONS FOR IOT PRODUCT DESIGN

blog article

Jul 09, 2019

Mitigating cyber threats is critical to the launch of a successful product. Like technology itself, the Internet of Things (IoT) security is still in its infancy and is evolving rapidly. The legislation is also developing rapidly, with cybersecurity acts in EU and California creating further regulat...

Read More

Senate Bill Would Help Small Businesses Improve Cybersecurity SENATE BILL WOULD HELP SMALL BUSINESSES IMPROVE CYBERSECURITY

blog article

Jul 09, 2019

Small businesses are more likely to lack resources to build robust cybersecurity capabilities, but Sens. Gary Peters, D-Mich., and Marco Rubio, R-Fla., are looking to address that challenge with their recently introduced Small Business Cybersecurity Assistance Act. The bill would help educate small ...

Read More

Zoom fixes major Mac webcam security flaw with emergency patch ZOOM FIXES MAJOR MAC WEBCAM SECURITY FLAW WITH EMERGENCY PATCH

blog article

Jul 09, 2019

Video conferencing provider Zoom has pushed out an emergency patch to address the zero-day vulnerability for Mac users that could potentially expose a live webcam feed to an attacker, launching you into a Zoom video chat you’d never intended to launch. The move is a surprise reversal of Zoom&r...

Read More

Why Sales Leaders Need to Digitally Transform Their Teams WHY SALES LEADERS NEED TO DIGITALLY TRANSFORM THEIR TEAMS

blog article

Jul 08, 2019

Three key trends are driving the need for sales leaders to digitally transform their organizations. First, b-to-b buyers are conducting more of their purchase journey in the digital arena and demanding the same kind of frictionless and seamless customer experience they enjoy as consumers. Second, th...

Read More

The Most Important Metric for Sales Leaders in Subscription Businesses to Track and Use to Drive Revenue Growth THE MOST IMPORTANT METRIC FOR SALES LEADERS IN SUBSCRIPTION BUSINESSES TO TRACK AND USE TO DRIVE REVENUE GROWTH

blog article

Jul 08, 2019

Subscription businesses that charge customers monthly for using their offerings are expanding rapidly in response to consumers’ and b-to-b buyers’ desire to try a product and walk away easily if they’re not achieving the expected value. However, the subscription-based business mode...

Read More

EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY

blog article

Jul 08, 2019

The cybersecurity skills shortage is a pressing concern for businesses, with the current shortfall estimated to be around 2 million unfilled positions, a number that is expected to rise to around 3.5 million by 2021. If there’s an upside to this shortage, it is that for those interested in a c...

Read More

State and Local Agencies Can Boost Cybersecurity with Federal Support STATE AND LOCAL AGENCIES CAN BOOST CYBERSECURITY WITH FEDERAL SUPPORT

blog article

Jul 08, 2019

Security is not a one-time event: Everyone knows it takes constant monitoring to detect and shore up weaknesses, find and patch vulnerabilities, and stay on top of constantly evolving threats. This requires time, expertise, tools and money — but help is at hand. The U.S. Department of Homeland...

Read More

How to Secure Your Mid-Size Organization from the Next Cyber Attack HOW TO SECURE YOUR MID-SIZE ORGANIZATION FROM THE NEXT CYBER ATTACK

blog article

Jul 08, 2019

Cyber-attacks have become very common these days, and it is carried out on a full-scale. More and more mid-sized organizations are frequently targetted. However, as for the cybersecurity personnel who think that mid-sized organizations are safe, you guys need to think again! By far, the online attac...

Read More

Why 5G and AI will determine cybersecurity strategy for the next decade WHY 5G AND AI WILL DETERMINE CYBERSECURITY STRATEGY FOR THE NEXT DECADE

blog article

Jul 08, 2019

BI.ZONE CEO Dmitry Samartsev and World Economic Forum head of operations William Dixon analysed the most popular technologies and evaluated the cyber risks of tomorrow. Experts talked about the three technologies that are likely to determine the next decade expressed in a joint analytical article. O...

Read More

Prioritising information security during digital transformation PRIORITISING INFORMATION SECURITY DURING DIGITAL TRANSFORMATION

blog article

Jul 08, 2019

Security is on everyone’s mind these days – especially when it comes to organisations that use technology as a main component of their service offering. Growing pressure from consumer expectations is driving many companies to transform and provide customers and members with the fast, dig...

Read More

Security SECURITY'S NEW FOCUS: DEFENSIBILITY

blog article

Jul 08, 2019

So, you’ve obtained the buy-in, spent the money, and have gone through the motions of creating your information security program. You’ve done what you believe to be right in terms of design, implementation and ongoing oversight, all in the interest of minimizing business risks. Framework...

Read More

31 Must-Know Healthcare Cybersecurity Statistics For 2019 31 MUST-KNOW HEALTHCARE CYBERSECURITY STATISTICS FOR 2019

blog article

Jul 07, 2019

The healthcare industry is a prime target of hackers. The importance of cybersecurity in healthcare is an essential consideration for all organizations handling patient data. Be aware of the latest threats; read our article on the latest Healthcare Cybersecurity Statistics. Cybersecurity Healthcare ...

Read More

Current Threats in Ransomware CURRENT THREATS IN RANSOMWARE

blog article

Jul 07, 2019

Ransomware “Growth” Ransomware attacks have gained prominence in recent times, and industries and governments across the world have implemented policies and advisories to counter the threat. The attack involves a malicious program that holds user or organizational data for “ransom&...

Read More

The critical shortage of cybersecurity expertise THE CRITICAL SHORTAGE OF CYBERSECURITY EXPERTISE

blog article

Jul 04, 2019

For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. ...

Read More

Centre for police cyber security goes live CENTRE FOR POLICE CYBER SECURITY GOES LIVE

blog article

Jul 04, 2019

It went into operation this week with an initial monitoring service that scrutinises the force’s cloud based IT estate, and the programme team is now working on a phased implementation programme to bring in other forces across England and Wales. The NMC has been set up under the National Enabl...

Read More

Critical Security Flaws in Zipato Smart Hub Let Hackers Walk into Your Home CRITICAL SECURITY FLAWS IN ZIPATO SMART HUB LET HACKERS WALK INTO YOUR HOME

blog article

Jul 04, 2019

Three security vulnerabilities in Zipato smart hubs, including a critical one, enable hackers, when combined, to break into a user’s home by easily unlocking smart locks on doors, writes TechCrunch. “Two vulnerabilities are in the design and implementation of the authentication mechanism...

Read More

How to make sense of Cybersecurity Frameworks HOW TO MAKE SENSE OF CYBERSECURITY FRAMEWORKS

blog article

Jul 04, 2019

Every time when we have something precious, it is human nature to preserve it from any external damage or threat. Be it the money, jewelry, or properties we ensure everything is safe and intact by practicing due security measures. As a result, sighting security guards is no big deal, as the world ar...

Read More

Protect sensitive information with Seqrite Encryption PROTECT SENSITIVE INFORMATION WITH SEQRITE ENCRYPTION

blog article

Jul 03, 2019

Among the most important assets that an enterprise possesses, data is undoubtedly the most important. In today’s digital age, there are reams of data being processed, transmitted and disseminated every millisecond and much of the world’s economy runs on data. Hence, organizations must ta...

Read More

Finding New Approaches to Web Application Security FINDING NEW APPROACHES TO WEB APPLICATION SECURITY

blog article

Jul 03, 2019

Most of us rely on web applications for, well, just about everything, which is why a distributed denial-of-service (DDoS) attack or other Domain Name System (DNS)-related outage can have such a negative impact on a business. Because so much is centered on web services and similar technology nowadays...

Read More

Ransomware As A Tool – LockerGoga RANSOMWARE AS A TOOL – LOCKERGOGA

blog article

Jul 03, 2019

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware...

Read More

Sircam: Worm, Virus, Trojan Horse? SIRCAM: WORM, VIRUS, TROJAN HORSE?

blog article

Jul 02, 2019

At Exabeam, we’re not only interested in developing the newest cybersecurity, we’re also fascinated by what we can learn from older security technologies. Each month the History of Cybersecurity 2019 Calendar features key dates in cybersecurity history, along with a related trivia questi...

Read More

Phishing, cryptocurrency attacks threaten data security – Microsoft PHISHING, CRYPTOCURRENCY ATTACKS THREATEN DATA SECURITY – MICROSOFT

blog article

Jul 02, 2019

Microsoft has advised government and business organisations to put adequate security in place to prevent cyberattacks through phishing and cryptocurrency in the coming months. Speaking at a cybersecurity roundtable in Lagos, the company said it had observed rising incidents of Enterprise Resource Pl...

Read More

Want to Sleep Better at Night? Start Thinking Differently about Ransomware WANT TO SLEEP BETTER AT NIGHT? START THINKING DIFFERENTLY ABOUT RANSOMWARE

blog article

Jul 02, 2019

One of the most well-known ransomware attacks occurred in May 2017, when the Wannacry attack unfolded. That attack affected over 200,000 users and infected more than 300,000 computers. CBS News estimated the WannaCry attack resulted in losses upwards of $4 billion. How? When hundreds of thousands of...

Read More

Tensions Between Countries Result in Cyber Attacks TENSIONS BETWEEN COUNTRIES RESULT IN CYBER ATTACKS

blog article

Jul 02, 2019

Today, threats of espionage between governments exist for multiple reasons. It stems from the United States trading and receiving cyber-attacks with China and Iran. Threats stem from response to the tense political climate between the two countries and the United States. For China and Iran, the rece...

Read More

Smart Home Device Provider Leaks Customer Information SMART HOME DEVICE PROVIDER LEAKS CUSTOMER INFORMATION

blog article

Jul 02, 2019

Smart home management platform running on the ElasticSearch server has been leaking private data for billions of users. The publicly accessible server is owned by Orvibo, a Chinese smart home provider. Obvibo offers its customers a platform, called SmartMate, for managing smart devices in their home...

Read More

Privacy and Data Protection in Multimedia Apps PRIVACY AND DATA PROTECTION IN MULTIMEDIA APPS

blog article

Jul 01, 2019

The mobile application (app) ecosystem has emerged to become one of the biggest global industries. Multimedia apps continue to be the most used form of communication and have not just changed the way we interact in our private lives: they have become an important means for organizations to interact ...

Read More

4 IT Security Best Practices SMBs Need To Adopt Immediately 4 IT SECURITY BEST PRACTICES SMBS NEED TO ADOPT IMMEDIATELY

blog article

Jul 01, 2019

While cyberattacks on companies that are household names are often highly publicised and reported on, attacks on small businesses often go unnoticed by the media despite accounting for 43% of targeted attacks. These attacks might not hit the front page, but they are having a significant impact on sm...

Read More

Qatar Issues Aviation Cybersecurity Guidelines QATAR ISSUES AVIATION CYBERSECURITY GUIDELINES

blog article

Jul 01, 2019

To help avoid disruption of civil aviation operations, the Civil Aviation Authority of Qatar and the Ministry of Communications and Transport have issued cybersecurity guidelines. CAA's new guidelines suggest organizations develop effective risk management, build a structure to respond to breach...

Read More

How To Secure The Internet Of Battlefield Things From Cyber Attacks HOW TO SECURE THE INTERNET OF BATTLEFIELD THINGS FROM CYBER ATTACKS

blog article

Jun 30, 2019

The proliferation of devices on the Internet is becoming a tidal wave. In addition to your phone, computer, video game console and television, the Internet now connects practically everything that has electronics and sensors: household appliances, heating and air conditioning systems, cars, airplane...

Read More

New Dridex Variant Slips By Anti-Virus Detection NEW DRIDEX VARIANT SLIPS BY ANTI-VIRUS DETECTION

blog article

Jun 28, 2019

A never-before-seen Dridex variant has been spotted in phishing emails using anti-virus detection evasion tactics. Researchers have spotted a variant of the Dridex banking trojan with new obfuscation capabilities that help it skirt anti-virus detection. While Dridex has been around since 2011, resea...

Read More

Cyber Attack: Securing Digital Payments In The Age Of Emerging Technologies CYBER ATTACK: SECURING DIGITAL PAYMENTS IN THE AGE OF EMERGING TECHNOLOGIES

blog article

Jun 28, 2019

About 70% of the organizations have experienced some form of cyber-attack. The attackers today are progressively building advanced technologies to target core banking systems. Patterns of fraudulent activity can only be detected on platforms that enable cross-border data flows. In recent times, Indi...

Read More

Is Being Secure and Being Compliant the Same Thing? IS BEING SECURE AND BEING COMPLIANT THE SAME THING?

blog article

Jun 28, 2019

Often times, when I ask a ConnectWise partner if they’re offering security to their SMB customers, their answer revolves around consulting on compliance. Verticals like healthcare, financial, government, and retail are low-hanging fruit for security revenue opportunities because compliance is ...

Read More

What Do All Successful ABM Programs Have in Common? WHAT DO ALL SUCCESSFUL ABM PROGRAMS HAVE IN COMMON?

blog article

Jun 28, 2019

There is no shortage of “best practices” based on theoretical ideals when it comes to ABM. But every organization has unique circumstances and needs and it has become increasingly clear that there is no “perfect” approach that applies universally. With this in mind, TechTarge...

Read More

What Nonprofits Need to Know About Zero-Trust Security WHAT NONPROFITS NEED TO KNOW ABOUT ZERO-TRUST SECURITY

blog article

Jun 27, 2019

During the Cold War, the U.S.’s mantra was “trust, but verify.” In the fight against cyberattackers, the new mantra is “never trust, always verify.” Nonprofit organizations once protected their IT environments by creating a perimeter around their networks. Everyone insi...

Read More

NIST Releases IoT Cyber Security And Privacy Risks Report NIST RELEASES IOT CYBER SECURITY AND PRIVACY RISKS REPORT

blog article

Jun 27, 2019

There are many enterprises already reaping the benefits of leveraging the Internet of Things (IoT) technology and devices, however as Bain & Company reports, “The IoT could be growing even faster with better cyber security.” In fact, their research shows that customers would pay 22% ...

Read More

THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL

blog article

Jun 27, 2019

The word “diversity” has become a buzzword among technical professionals and has been overused many times with little or no meaning to it. Instead of exploiting the word, brands and companies need to prove it. The reality is that cybersecurity lacks diversity, and this article will help ...

Read More

How to make cybersecurity resonate with employees HOW TO MAKE CYBERSECURITY RESONATE WITH EMPLOYEES

blog article

Jun 27, 2019

Organisations are facing increased threats from cyber attacks, and employees are often the weakest link in their defence posture. As much as you might hope that common sense would prevail, the reality is that best practices can often go in one ear and out the other. Employees who aren’t proper...

Read More

Six reasons your business needs cyber security SIX REASONS YOUR BUSINESS NEEDS CYBER SECURITY

blog article

Jun 26, 2019

Dr Bright Mawudor is the head of cyber security services at Internet Solutions Kenya. He explains why businesses cannot afford to ignore cyber security. 1. Data security Businesses collect all sorts of data in their day-to-day operations, from customer names and IDs to phone numbers and account deta...

Read More

Drafting an Appropriate Cybersecurity Policy DRAFTING AN APPROPRIATE CYBERSECURITY POLICY

blog article

Jun 26, 2019

Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent cybersecurity plan, you’re still at risk of being attacked; it’s simply the reality of today’s world. ...

Read More

Silex Malware Renders Internet-of-Things Devices Useless. Here’s How to Prevent It SILEX MALWARE RENDERS INTERNET-OF-THINGS DEVICES USELESS. HERE’S HOW TO PREVENT IT

blog article

Jun 26, 2019

A new malware known as Silex is bringing smart devices to their knees. The Silex malware, according to ZDNet, ruins smart devices by gaining access to and destroying a device’s storage, eliminating its firewall and removing its network configuration. From here, the device stops working. Silex ...

Read More

Level of Cyber Risk to Businesses Held Steady in First Quarter According to LEVEL OF CYBER RISK TO BUSINESSES HELD STEADY IN FIRST QUARTER ACCORDING TO

blog article

Jun 25, 2019

Cyber security executives and teams—and for that matter organizations as a whole—could certainly use some good news when it comes to risk assessment, and perhaps a recent report provides just that. The Assessment of Business Cyber Risk (ABC) report released in April 2019 by the U.S. Cham...

Read More

How Machine Learning Within IncMan SOAR Empowers Security Analysts HOW MACHINE LEARNING WITHIN INCMAN SOAR EMPOWERS SECURITY ANALYSTS

blog article

Jun 25, 2019

In a recent blog post we took a look at the differences between Artificial Intelligence (AI) and Machine Learning (ML) and how today there were being used within the cybersecurity industry to help fight the growing number and sophistication of cyber attacks. Artificial intelligence and machine learn...

Read More

Malspam Emails Blanket LokiBot, NanoCore Malware With ISO Files MALSPAM EMAILS BLANKET LOKIBOT, NANOCORE MALWARE WITH ISO FILES

blog article

Jun 25, 2019

A new malicious campaign is spreading LokiBot and NanoCore trojans under the guise of an ISO file claiming to be an invoice. An ongoing spam campaign has been spotted using ISO disk image file attachments to disguise various information-stealing trojans, including LokiBot and NanoCore. Researchers s...

Read More

Suricata IDS: an overview of threading capabilities SURICATA IDS: AN OVERVIEW OF THREADING CAPABILITIES

blog article

Jun 25, 2019

A common discussion in the security industry is how to improve the effectiveness of detection and prevention systems. You can find tons of documentation and books about: The Defender's Dilemma, Blue Team vs Red Team, A Comprehensive Security Approach, among others. However, in any organization, ...

Read More

How to Optimize Your Conversion Funnel, from ToFu to BoFu HOW TO OPTIMIZE YOUR CONVERSION FUNNEL, FROM TOFU TO BOFU

blog article

Jun 25, 2019

No matter who your customer is or what you’re selling, it’s more likely than not that your customer will have to go through several steps before choosing to buy your product or service. Think about your own shopping habits: you don’t just buy the first thing you see. The first thin...

Read More

21 Ways to Triple Your B2B E-Commerce Conversions 21 WAYS TO TRIPLE YOUR B2B E-COMMERCE CONVERSIONS

blog article

Jun 25, 2019

It takes thoughtful work to scale an e-commerce store. I’m sure you’ve had a few growing pains of your own getting to the point where you are today. However, you’re reading this because you may not be content with where your conversions are at this precise moment. You may not even ...

Read More

Could the Breadcrumb Technique Help Boost Your Landing Page Conversions? COULD THE BREADCRUMB TECHNIQUE HELP BOOST YOUR LANDING PAGE CONVERSIONS?

blog article

Jun 24, 2019

We’ve all heard the term “less is more”. And we’ve been told this applies for landing pages too. I.e. your forms should be short and only ask for only the bare minimum of required information if you want to convert. As an example, one of the main questions someone typically h...

Read More

5 ways agencies can clean up their cyber hygiene 5 WAYS AGENCIES CAN CLEAN UP THEIR CYBER HYGIENE

blog article

Jun 24, 2019

Since the concept of cyber hygiene was described by Vinton Cerf in an address to Congress in 2000, government agencies have been cognizant of maintaining a holistic view of their security posture. In fact, in recent years there have been numerous efforts made to improve how agencies maintain their c...

Read More

How Artificial Intelligence (AI) Helps Bridge the Cybersecurity Skills Gap HOW ARTIFICIAL INTELLIGENCE (AI) HELPS BRIDGE THE CYBERSECURITY SKILLS GAP

blog article

Jun 24, 2019

The widespread shortage of skilled security operations and threat intelligence resources in security operations centers (SOCs) leaves many organizations open to the increased risk of a security incident. That’s because they are unable to effectively investigate all discovered, potentially mali...

Read More

NIST issues new cyber guidelines for contractors NIST ISSUES NEW CYBER GUIDELINES FOR CONTRACTORS

blog article

Jun 24, 2019

The National Institute of Standards and Technology has issued draft security guidance to help contractors working with high-value assets protect the unclassified (but still sensitive) government data that resides on their networks against advanced persistent threats and other attacks. A draft versio...

Read More

The week in security: Rethinking security in an age of cyber insecurity THE WEEK IN SECURITY: RETHINKING SECURITY IN AN AGE OF CYBER INSECURITY

blog article

Jun 24, 2019

It might all have been easier if the Internet had never existed, but the compromise of WhatsApp reflects the ever-changing nature of attacks in today’s cybersecurity threat climate. One approach to hardening vulnerable data has been to use field-level encryption, with MongoDB storing its data ...

Read More

Massive New Iranian Cyber Threat to U.S. Companies MASSIVE NEW IRANIAN CYBER THREAT TO U.S. COMPANIES

blog article

Jun 24, 2019

Russia has been responsible for probing and hacking U.S. industrial control systems and recently, the U.S. attacked Russia’s systems in retaliation. We have long-since warned companies they are on the front lines of a war with nation states such as Iran, Russia, China and North Korea. Countrie...

Read More

Easy Language Learning by Vera F. Birkenbihl – The Decoding Method EASY LANGUAGE LEARNING BY VERA F. BIRKENBIHL – THE DECODING METHOD

blog article

Jun 24, 2019

Forget about cramming vocabulary: the best way to learn a language is by using decoding exercises. Translate a German sentence word-by-word into your native language – thus you will learn the word’s meaning as well as the language’s grammar. Decoding means to “decipher”...

Read More

An overview on insider threat awareness AN OVERVIEW ON INSIDER THREAT AWARENESS

blog article

Jun 24, 2019

Organizations usually focus on cyber threats which are external in origin. These include anti-malware, external firewalls, DDoS attack mitigation, external data loss prevention, and the list goes on. That's great, external cyber attacks are very common so it's vital to protect your networks ...

Read More

9 OF THE BIGGEST BOTNET ATTACKS OF THE 21ST CENTURY 9 OF THE BIGGEST BOTNET ATTACKS OF THE 21ST CENTURY

blog article

Jun 24, 2019

Botnets are responsible for hacking, spamming, and malware—here are the most significant botnet attacks with the worst consequences. Individual systems, commonly known as zombies, combined with the criminal’s system (from where all other systems are controlled) are known as a master of t...

Read More

Current Cybersecurity Market Strong: What’s Driving It? CURRENT CYBERSECURITY MARKET STRONG: WHAT’S DRIVING IT?

blog article

Jun 24, 2019

Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and networ...

Read More

SME collaboration delivering effective Public Sector IT security SME COLLABORATION DELIVERING EFFECTIVE PUBLIC SECTOR IT SECURITY

blog article

Jun 24, 2019

When Becrypt began developing security technology for government more than a decade ago, relationships with Systems Integrators were the only viable route to understanding and accessing customer requirements. Our experiences today are of a vastly more diverse supply chain, with some major government...

Read More

Calculating your cybersecurity net worth doesn CALCULATING YOUR CYBERSECURITY NET WORTH DOESN'T HAVE TO BE COMPLEX

blog article

Jun 24, 2019

Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports include financial and non-financial assets as well as all accumulated liabilities in order to determine if the company is profita...

Read More

NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS

blog article

Jun 21, 2019

As technology becomes more deeply embedded into business and society in general, business owners and cybersecurity professionals are facing the task of our generation. That is, securing the global IT infrastructure from those cybercriminals who want to steal data, blackmail big corporations, and tak...

Read More

Businesses and Charities Experiencing More Cybersecurity Breaches BUSINESSES AND CHARITIES EXPERIENCING MORE CYBERSECURITY BREACHES

blog article

Jun 21, 2019

Thirty-two percent of businesses and 22 percent of charities are experiencing more cybersecurity attacks, the 2019 Cyber Security Breaches Survey says. The average annual cost for business that lost data or assets after breaches was more than $5,000 and more than $12,000 for charities. Among the 32 ...

Read More

Cyber Security Findings for the Media Industry CYBER SECURITY FINDINGS FOR THE MEDIA INDUSTRY

blog article

Jun 21, 2019

Securing a company’s digital infrastructure has become a major concern to corporations worldwide. With leading security companies and other organizations alerting corporations and the public to recent widespread, state-sponsored domain name system (DNS) hijacking, more and more brands are star...

Read More

The Last 18 Months of Mobile: Blacklisted Apps Rise, Antivirus Apps Prove More Harm Than Good THE LAST 18 MONTHS OF MOBILE: BLACKLISTED APPS RISE, ANTIVIRUS APPS PROVE MORE HARM THAN GOOD

blog article

Jun 20, 2019

These days, mobile security is top of mind for consumers and businesses alike, and for good reason—the mobile channel is ubiquitous and provides threat actors a vast attack surface to target. At home, 82 percent of online users in the United States used a mobile device for online shopping, wit...

Read More

Medical debt collection agency files for bankruptcy protection after data breach MEDICAL DEBT COLLECTION AGENCY FILES FOR BANKRUPTCY PROTECTION AFTER DATA BREACH

blog article

Jun 20, 2019

A US medical bill and debt collection agency has filed for Chapter 11 bankruptcy protection after suffering a data breach that exposed the sensitive personal data of at least 20 million people. Compromised data included names, addresses, dates of birth and Social Security numbers – data that c...

Read More

Will you suffer a data breach if you implement ISO 27001? WILL YOU SUFFER A DATA BREACH IF YOU IMPLEMENT ISO 27001?

blog article

Jun 20, 2019

Someone recently asked us: “Will my organisation be breached if we implement ISO 27001?” At first we thought they meant ‘will implementing ISO 27001 make me susceptible to data breaches?’ to which the answer is obviously ‘no’. ISO 27001 is the international standa...

Read More

Operationalize the Power of HackerTarget’s Security Tools with IncMan SOAR OPERATIONALIZE THE POWER OF HACKERTARGET’S SECURITY TOOLS WITH INCMAN SOAR

blog article

Jun 20, 2019

To stay ahead of today’s sophisticated cyber attacks, organizations must develop a diverse defense strategy. From staffing their security teams with the most knowledgeable and well-rounded candidates to deploying the most recent toolsets and defense products, the need to bring depth to a secur...

Read More

Examining the SymCrypt DoS Vulnerability EXAMINING THE SYMCRYPT DOS VULNERABILITY

blog article

Jun 19, 2019

Early last week, Tavis Ormandy released a new DoS vulnerability affecting the SymCrypt library. While it provided some details, I decided to look at it a little further to understand where this vulnerability occurs. We start by describing the vulnerability, then verifying that the vulnerability exis...

Read More

URLZone top malware in Japan, while Emotet and LINE Phishing round out the landscape URLZONE TOP MALWARE IN JAPAN, WHILE EMOTET AND LINE PHISHING ROUND OUT THE LANDSCAPE

blog article

Jun 19, 2019

In many ways, the threat landscape in Japan resembles global trends, with the regionalization and widespread distribution of Emotet, and the steady increase in campaigns that utilize sophisticated social engineering techniques. However, while Emotet dominated malicious message volumes in many region...

Read More

Cybersecurity, Data Privacy Top Concerns for Enterprises CYBERSECURITY, DATA PRIVACY TOP CONCERNS FOR ENTERPRISES

blog article

Jun 19, 2019

Cybersecurity and data privacy captured the two top spots in respondents’ list of E&C concerns, according to the 2019 Definitive Corporate Compliance Benchmark Report. Data security and privacy breaches have become a daily worry for most organizations and research shows that most organizat...

Read More

Cyber Security Challenges in Healthcare IoT Devices CYBER SECURITY CHALLENGES IN HEALTHCARE IOT DEVICES

blog article

Jun 19, 2019

The recent Vectra 2019 Spotlight Report on Healthcare indicates that the proliferation of healthcare internet-of-things (IoT) devices, along with a lack of network segmentation, insufficient access controls and reliance on legacy systems, has created an increasing attack surface that can be exploite...

Read More

WHY ARE WE MAKING INFORMATION SECURITY SO HARD? WHY ARE WE MAKING INFORMATION SECURITY SO HARD?

blog article

Jun 18, 2019

I often hear from folks that in general, small and medium-sized businesses lack a strategy and proper controls, but the big guys have it covered. Well, it might surprise you to learn that 30% of large enterprises state they still lack an overall information security strategy and we’re talking ...

Read More

Fake Antivirus Software -The Most Persistent Threat On The Internet, How To Be Aware? FAKE ANTIVIRUS SOFTWARE -THE MOST PERSISTENT THREAT ON THE INTERNET, HOW TO BE AWARE?

blog article

Jun 17, 2019

Cyber criminals are continually searching for better approaches to manipulate users on the web. One of your most grounded lines of barrier against having your own information and your cash fall under the control of a cyber criminal is to stay mindful and watchful. It takes on the appearance of real ...

Read More

DDoS attack that knocked Telegram secure messaging service offline linked to Hong Kong protests DDOS ATTACK THAT KNOCKED TELEGRAM SECURE MESSAGING SERVICE OFFLINE LINKED TO HONG KONG PROTESTS

blog article

Jun 13, 2019

An attack which targeted users of the Telegram app on Wednesday might be linked to protests in Hong Kong that turned violent. That’s one of the theories in circulation, after a distributed denial-of-service (DDoS) attack disrupted legitimate access to the Telegram secure messaging app by swamp...

Read More

Entering the Third Decade of Cyber Threats: Toward Greater Clarity in Cyberspace ENTERING THE THIRD DECADE OF CYBER THREATS: TOWARD GREATER CLARITY IN CYBERSPACE

blog article

Jun 13, 2019

Over the course of just a few decades, the world has entered into a digital age in which powerful evolving cyber capabilities provide access to everyone connected online from any place on the planet. Those capabilities could be harnessed for the benefit of humanity; they might also be abused, leadin...

Read More

Vulnerable Software – The Gift that Keeps on Giving VULNERABLE SOFTWARE – THE GIFT THAT KEEPS ON GIVING

blog article

Jun 13, 2019

Concerning the latest data breaches on record, this past May was rather noteworthy. A host of organizations from around the world announced in fact, that they had experienced a data breach. From online retailers, travel booking sites, and high-tech startups, to social sharing sites, healthcare billi...

Read More

The Real Problem with All That Personally Identifiable Data We’re Collecting THE REAL PROBLEM WITH ALL THAT PERSONALLY IDENTIFIABLE DATA WE’RE COLLECTING

blog article

Jun 13, 2019

That’s because that camera is likely not only taking a high-resolution snapshot of your face but also storing it in a database for as long as that large drugstore chain chooses, with no other information associated to you. But every time you walk into that drugstore, or any of their other stor...

Read More

The state of cyber security in 2019: A half-year retrospective THE STATE OF CYBER SECURITY IN 2019: A HALF-YEAR RETROSPECTIVE

blog article

Jun 12, 2019

For most of North America, approaching the middle of the year means going on summer vacation, preparing for the Atlantic hurricane season and enjoying warmer weather. For many information security specialists, the half-year mark involves looking at how cyber threats have unfolded since January and d...

Read More

MegaCortex continues trend of targeted ransomware attacks MEGACORTEX CONTINUES TREND OF TARGETED RANSOMWARE ATTACKS

blog article

Jun 12, 2019

MegaCortex is a relatively new ransomware family that continues the 2019 trend of threat actors developing ransomware specifically for targeted attacks on enterprises. While GandCrab apparently shut its doors, several other bespoke, artisanal ransomware families have taken its place, including Robin...

Read More

Ransomware attack paralyses Lake City email, landlines and credit card services RANSOMWARE ATTACK PARALYSES LAKE CITY EMAIL, LANDLINES AND CREDIT CARD SERVICES

blog article

Jun 12, 2019

Lake City has warned citizens that administrative systems, including email and credit card systems, are down following a ransomware attack on the Florida municipality. The attack, called “Triple Threat” in a press release issued by the city, reportedly combined three attack vectors to in...

Read More

9 Individuals Connected to a Hacking Group Charged With Online Identity Theft 9 INDIVIDUALS CONNECTED TO A HACKING GROUP CHARGED WITH ONLINE IDENTITY THEFT

blog article

Jun 12, 2019

Nine Individuals Connected to a Hacking Group Charged With Online Identity Theft and Other Related Charges Six individuals connected to a hacking group known to its members as “The Community” were charged in a fifteen count indictment unsealed today with conspiracy to commit wire fraud, ...

Read More

Cybersecurity pros think the enemy is winning CYBERSECURITY PROS THINK THE ENEMY IS WINNING

blog article

Jun 11, 2019

There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a-mouse game is wearing on security professionals, and many feel they are losing in the war against cybercriminals. The first figures are from the Informati...

Read More

Government No Longer Has to Choose Between Cybersecurity and Productivity GOVERNMENT NO LONGER HAS TO CHOOSE BETWEEN CYBERSECURITY AND PRODUCTIVITY

blog article

Jun 11, 2019

It’s one of the oldest and trickiest balancing acts that government CIOs face: how to ensure the highest levels of cybersecurity without sacrificing end- user productivity. For years, organizations have struggled to weigh the benefits of adding security controls to combat cyber attacks versus ...

Read More

The Importance of a Cybersecurity Strategy for the Business THE IMPORTANCE OF A CYBERSECURITY STRATEGY FOR THE BUSINESS

blog article

Jun 11, 2019

Research conducted by AV-Test, an independent IT security institute, has revealed that nearly 350,000 new malware programs are created daily. It is unfortunate that some companies still consider malware to be a minor threat, not realizing that something as trivial as a malware-infected email may be ...

Read More

Think you’re not susceptible to phishing? Think again THINK YOU’RE NOT SUSCEPTIBLE TO PHISHING? THINK AGAIN

blog article

Jun 11, 2019

A version of this blog was originally published on 8 January 2018. On average, one in ten emails is a phishing scam. With all that experience, you’d think we’d be pretty good at spotting malicious messages by now. According to a PhishMe survey, many of us think that’s the case. Ver...

Read More

Good enough security isn GOOD ENOUGH SECURITY ISN'T GOOD ENOUGH

blog article

Jun 10, 2019

Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an ostrich putting its head in the sand or an opossum playing dead to ignore an impending thre...

Read More

Vulnerability scanning – in house or third party? VULNERABILITY SCANNING – IN HOUSE OR THIRD PARTY?

blog article

Jun 10, 2019

You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can h...

Read More

How spammers use Google services HOW SPAMMERS USE GOOGLE SERVICES

blog article

Jun 10, 2019

As you know, Google is not just a search tool, but multiple services used by billions of people every day: Gmail, Calendar, Google Drive, Google Photos, Google Translate, the list goes on. And they are all integrated with each other. Calendar is linked to Gmail, Gmail to Google Drive, Google Drive t...

Read More

Cybersecurity for End-users: Awareness is a Means, Not a Goal CYBERSECURITY FOR END-USERS: AWARENESS IS A MEANS, NOT A GOAL

blog article

Jun 09, 2019

Due to the many cyber attacks that have taken place in recent years, organisations and (local) governments are increasingly putting cybersecurity on the agenda as a problem that needs to be tackled. Historically viewed as ‘merely an IT problem’ that can be solved through better programmi...

Read More

Binding Link Between Cyber Warfare and IT Security BINDING LINK BETWEEN CYBER WARFARE AND IT SECURITY

blog article

Jun 09, 2019

Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over th...

Read More

Some Cisco Devices May Be Vulnerable To Hacker Attacks SOME CISCO DEVICES MAY BE VULNERABLE TO HACKER ATTACKS

blog article

Jun 07, 2019

Intel has been in the news several times over the last 18 months due to serious security flaws that have been found in their chipsets, beginning with the dreaded Spectre and Meltdown flaws. Now with MDS attacks, they're not the only ones. Recently, researchers have discovered serious flaws in Ci...

Read More

Information Security Learn Path at Enterprise World INFORMATION SECURITY LEARN PATH AT ENTERPRISE WORLD

blog article

Jun 06, 2019

Security has become job #1 for every organization and that’s especially true when it comes to Enterprise Information Management (EIM). The Information Security Learn Path at OpenText™ Enterprise World 2019 in Toronto provides practical tools and best practices for using OpenText products...

Read More

6 Bookmark Worthy Cyber Security Blogs You Should Follow Right Away 6 BOOKMARK WORTHY CYBER SECURITY BLOGS YOU SHOULD FOLLOW RIGHT AWAY

blog article

Jun 06, 2019

Online security and data privacy are two of the hottest topics in the industry at present. And if you are someone who is working in the domain of cyber security or planning to pursue a career in cybersecurity, it is imperative to stay updated with the ongoing trends in the domain. While many people ...

Read More

Why your employees are a cybersecurity threat WHY YOUR EMPLOYEES ARE A CYBERSECURITY THREAT

blog article

Jun 06, 2019

In mid-April, Bodybuilding.com announced that its company network had been breached by hackers. This would only be a blip in the endless stream of data breach headlines – security firm Positive Technologies reports that cyberattacks affected billions of people in 2018 – except that it wa...

Read More

5 ways to detect a phishing email – with examples 5 WAYS TO DETECT A PHISHING EMAIL – WITH EXAMPLES

blog article

Jun 06, 2019

Phishing is one of the most longstanding and dangerous methods of cyber crime. It uses deceptive messages to trick victims into clicking bogus links, downloading malicious attachments or sending sensitive information. Despite what people think they know about phishing, they consistently fall victim....

Read More

A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence A10 NETWORKS ADDS ZERO-DAY AUTOMATED PROTECTION (ZAP) TO DDOS DEFENCE

blog article

Jun 05, 2019

A10 Networks has announced Zero-day Automated Protection (ZAP) capabilities to its Thunder Threat Protection System (TPS) family of Distributed Denial of Service (DDoS) defence solutions. The ZAP capabilities automatically recognise the characteristics of DDoS attacks and apply mitigation filters wi...

Read More

Privileged Access Management Issues? Enter Tripwire Password Manager PRIVILEGED ACCESS MANAGEMENT ISSUES? ENTER TRIPWIRE PASSWORD MANAGER

blog article

Jun 04, 2019

So, you have 2000 network devices in your environment and everyone is telling you that you have to rotate all 2000 device passwords every 30, 60 or 90 days (at a minimum) — who has time for that?! How are you going to manage this? The task seems monumental and time-consuming! If nothing is don...

Read More

Cybersecurity Attacks 101: Phishing, Cryptojacking and Ransomware CYBERSECURITY ATTACKS 101: PHISHING, CRYPTOJACKING AND RANSOMWARE

blog article

Jun 04, 2019

Malware is getting smarter. Cybercriminals now use artificial intelligence and machine learning tools to get better at tricking users into running malicious code and giving away sensitive data. Three client-side attacks have been among the most popular over the past two years and will remain threats...

Read More

ANOTHER MAC BUG LETS HACKERS INVISIBLY CLICK SECURITY PROMPTS ANOTHER MAC BUG LETS HACKERS INVISIBLY CLICK SECURITY PROMPTS

blog article

Jun 03, 2019

TWO HOURS INTO his keynote at Apple’s Worldwide Developer's Conference last June, senior vice president Craig Federighi revealed a new privacy feature in MacOS Mojave that forces applications to ask the user if they want to "allow" or "deny" any request to access sensit...

Read More

Ransomware: To Blame or Not to Blame in Baltimore Cyberattack? RANSOMWARE: TO BLAME OR NOT TO BLAME IN BALTIMORE CYBERATTACK?

blog article

Jun 02, 2019

As the city of Baltimore continues to recover from the devastating ransomware attack that struck on May 7, 2019, the total incident costs are estimated to be at least $18.2 million, according to the Baltimore Sun. City leaders have not given a timetable for how long the total recovery effort will ta...

Read More

Next Generation Cyber Threats: Images NEXT GENERATION CYBER THREATS: IMAGES

blog article

May 31, 2019

Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization's security and steal their crown jewels - their information. Traditional Data Loss Prevention (DLP) technology provides protecti...

Read More

Incident Of The Week: Checkers Restaurants Details Data Breach INCIDENT OF THE WEEK: CHECKERS RESTAURANTS DETAILS DATA BREACH

blog article

May 31, 2019

Checkers Drive-In Restaurants Inc. notified its customers that about 15% of its restaurants in 20 states may have had data exposures possibly starting back into 2015, and some lasting until about mid-April this year. The company operates and franchises nearly 900 restaurants. The data security issue...

Read More

5 Crucial Tips to Improve Your Employees Awareness of Cyber Threats 5 CRUCIAL TIPS TO IMPROVE YOUR EMPLOYEES AWARENESS OF CYBER THREATS

blog article

May 31, 2019

Cyber protection is an essential aspect of every company’s governance strategy. What’s more, it might even be the most crucial part of security in general. Cyber threats are a huge problem today, and they have been an increasing threat for quite some time. For example, spam is still ther...

Read More

12 Best Cybersecurity Practices in 2019 12 BEST CYBERSECURITY PRACTICES IN 2019

blog article

May 30, 2019

It’s no exaggeration: any company can fall victim to cyber crime. Reports of cyber attacks come from government organizations, educational and healthcare institutions, banks, law firms, nonprofits, and many other organizations. Hackers, insider threats, ransomware, and other dangers are out th...

Read More

5 FUNDAMENTAL CYBER SECURITY TIPS FOR YOUR BUSINESS 5 FUNDAMENTAL CYBER SECURITY TIPS FOR YOUR BUSINESS

blog article

May 30, 2019

From the benefits of multifactor authentication to data breach recovery and prevention tips, our business security blog has over 80 entries relating to data and cyber security. Below, we highlight five fundamental cyber security tips your business needs to follow based on popular topics on our blog....

Read More

The 8 Elements of an Information Security Policy THE 8 ELEMENTS OF AN INFORMATION SECURITY POLICY

blog article

May 30, 2019

Security threats are constantly evolving, and compliance requirements are becoming increasingly complex. Organizations large and small must create a comprehensive security program to cover both challenges. Without a security policy, it is impossible to coordinate and enforce a security program acros...

Read More

ITProPortal: CrowdStrike Discusses Life Beyond Malware ITPROPORTAL: CROWDSTRIKE DISCUSSES LIFE BEYOND MALWARE

blog article

May 28, 2019

The traditional cybersecurity model is an outdated one, focused on building up the perimeter defenses of an organization like some sort of medieval fortress, in an effort to mitigate the threat of incoming malware. However, it is an uncomfortable fact for many that the multi-million-dollar cybersecu...

Read More

Return to the City of Cron – Malware Infections on Joomla and WordPress RETURN TO THE CITY OF CRON – MALWARE INFECTIONS ON JOOMLA AND WORDPRESS

blog article

May 27, 2019

We recently had a client that had a persistent malware infection on their shared hosting environment that would re-infect the files quickly after we had cleaned them. The persistence was being created by a cron that was scheduled to download malware from a third party domain. Persistent Malware Infe...

Read More

Cyber Security Today: Beware of email lawsuit scam, an Android missed call con and how’s your country doing? CYBER SECURITY TODAY: BEWARE OF EMAIL LAWSUIT SCAM, AN ANDROID MISSED CALL CON AND HOW’S YOUR COUNTRY DOING?

blog article

May 27, 2019

Beware of email lawsuit scam, an Android missed call con and how’s your country doing? Welcome to Cyber Security Today. It’s Monday May 27th. I’m Howard Solomon, contributing reporter on cyber security for ITWorldCanda.com It’s Memorial Day in the U.S., hope you’re havi...

Read More

Why Cyber Security Is Important For Your Business? WHY CYBER SECURITY IS IMPORTANT FOR YOUR BUSINESS?

blog article

May 27, 2019

Huge companies have turned much of their attention toward cybersecurity nowadays. As a famous person once said “handling of company data should be your top priority”, we couldn’t agree more with it. Technology is amazing, and technology has made it much easier for us to live our li...

Read More

The IT Security Challenges All Small Businesses Face THE IT SECURITY CHALLENGES ALL SMALL BUSINESSES FACE

blog article

May 26, 2019

The world’s rapidly increasing cyber attacks do not know where to stay and are evolving their attack methods on a daily basis. Many companies regardless of size are good prey for attackers. The impact of cyber attacks continues to increase, regardless of the size of the company or organization...

Read More

How To Become An Ethical Hacker – Learn Hacking Step By Step HOW TO BECOME AN ETHICAL HACKER – LEARN HACKING STEP BY STEP

blog article

May 25, 2019

Ethical Hacking is the process of penetrating into the system to find out vulnerabilities, threats, etc. In general ethical hacking is mainly performed to improve the security of the network. Normally ethical hackers utilize the same methods by the malicious hackers but the ethical hackers do everyt...

Read More

Most security pros have considered quitting due to a lack of resources MOST SECURITY PROS HAVE CONSIDERED QUITTING DUE TO A LACK OF RESOURCES

blog article

May 24, 2019

Security professionals believe their jobs and the overall security of their organizations would benefit from an autonomous security solution that could automatically react to and prevent attacks. More technology is harming cybersecurity. The survey found that security professionals are not being hel...

Read More

Cybersecurity is a top-level management priority CYBERSECURITY IS A TOP-LEVEL MANAGEMENT PRIORITY

blog article

May 23, 2019

Despite all the warnings, cybercrime has long been seen as a pure IT issue rather than a business risk. It took the effects of the NotPetya attack in 2017 to change this view, as several large companies reported high losses. According to reports, the attack cost transport giants Maersk and FedEx, ad...

Read More

Why You Should Forget Everything You Know About Cyber Security? WHY YOU SHOULD FORGET EVERYTHING YOU KNOW ABOUT CYBER SECURITY?

blog article

May 23, 2019

In the 1990s, Olestra, a no-calorie artificial fat appeared in snack foods. It promised consumers the ability to eat delicious and fattening foods without gaining weight. Unfortunately, Olestra had a swift fall from grace when angry consumers, felled by crippling gastrointestinal pains, filed lawsui...

Read More

A Cybersecurity Guide for Digital Nomads A CYBERSECURITY GUIDE FOR DIGITAL NOMADS

blog article

May 21, 2019

Technology has unlocked a new type of worker, unlike any we have seen before—the digital nomad. Digital nomads are people who use technologies like WiFi, smart devices, and cloud-based applications to work from wherever they please. For some digital nomads, this means their favorite coffee sho