RESOURCES


home.aspx
   
Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Systems MEETING CYBERSECURITY, SAFETY, AND RELIABILITY CONTROLS FOR YOUR LINUX-BASED SYSTEMS

whitepaper

Oct 09, 2020

Do you have security requirements that will need to be met? Cybersecurity and anti-tamper controls require significant attention for any aerospace and defense weapons system. Meeting NIST 800-53 Risk Management Framework (RMF) controls is a significant challenge and requires a knowledgeable, availab...

Read More

Zero Trust – Demystified ZERO TRUST – DEMYSTIFIED

article

Jul 29, 2020

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions of this depending on which vendor you ask. To help others understand what Zero Trust is, this white paper covers the key aspects of...

Read More

5 Ways A CISO Can Tackle The Cybersecurity Skills Shortage Now 5 WAYS A CISO CAN TACKLE THE CYBERSECURITY SKILLS SHORTAGE NOW

whitepaper

Jul 18, 2020

Every CISO knows that finding skilled security staff these days is not only hard but getting harder. The number of organizations reporting a cybersecurity skills shortage has risen every year from 42% in 2015 to 53% last year. Estimates suggest this will translate into a shortfall of around 2 millio...

Read More

How Organizations can prepare for Cybersecurity HOW ORGANIZATIONS CAN PREPARE FOR CYBERSECURITY

article

Apr 22, 2020

According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technological initiatives like cloud-based applications and workloads that require security beyond the traditional d...

Read More

5 Ways a CISO can Tackle the Cybersecurity Skills Shortage Now 5 WAYS A CISO CAN TACKLE THE CYBERSECURITY SKILLS SHORTAGE NOW

whitepaper

Apr 21, 2020

Every CISO knows that finding skilled security staff these days is not only hard but getting harder. The number of organizations reporting a cybersecurity skills shortage has risen every year from 42% in 2015 to 53% last year. Estimates suggest this will translate into a shortfall of around 2 millio...

Read More

A 4 Step Guide to Stronger OT Cybersecurity A 4 STEP GUIDE TO STRONGER OT CYBERSECURITY

article

Apr 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time....

Read More

Work From Home: Cyber Security During Covid-19 WORK FROM HOME: CYBER SECURITY DURING COVID-19

article

Apr 14, 2020

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different ...

Read More

Webroot: Widespread Lack of Cybersecurity Best Practices WEBROOT: WIDESPREAD LACK OF CYBERSECURITY BEST PRACTICES

article

Apr 07, 2020

A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama and Arkansas are the least cyber secure states in the country, while Nebraska, New Hampshire, Wyomin...

Read More

TLS Research: North-South and East-West Web Traffic Analysis TLS RESEARCH: NORTH-SOUTH AND EAST-WEST WEB TRAFFIC ANALYSIS

whitepaper

Apr 06, 2020

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? ...

Read More

TLS Research: North-South and East-West Web Traffic Analysis TLS RESEARCH: NORTH-SOUTH AND EAST-WEST WEB TRAFFIC ANALYSIS

whitepaper

Apr 06, 2020

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? ...

Read More

Guide to Full Network Visibility and SSL/TLS Decryption GUIDE TO FULL NETWORK VISIBILITY AND SSL/TLS DECRYPTION

whitepaper

Apr 06, 2020

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. With Gigamon, you can optimize your network operations with full networ...

Read More

Guide to Full Network Visibility and SSL/TLS Decryption GUIDE TO FULL NETWORK VISIBILITY AND SSL/TLS DECRYPTION

whitepaper

Apr 06, 2020

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. With Gigamon, you can optimize your network operations with full networ...

Read More

Cybersecurity in the Time of COVID-19 CYBERSECURITY IN THE TIME OF COVID-19

article

Mar 30, 2020

A decade ago, Stuxnet pulled me into the accelerating, widening gyre of cybersecurity. I began to devote less time to global health, a topic on which I spent the previous decade developing familiarity and producing a large carbon footprint. I would frown when cybersecurity analysis borrowed concepts...

Read More

Progress Is the Promise in National Cybersecurity Strategy PROGRESS IS THE PROMISE IN NATIONAL CYBERSECURITY STRATEGY

article

Mar 23, 2020

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of th...

Read More

Guest Blog: Cyber security guidance for remote working GUEST BLOG: CYBER SECURITY GUIDANCE FOR REMOTE WORKING

article

Mar 20, 2020

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to p...

Read More

What You Need to Know About the Cybersecurity Solarium Commission Report WHAT YOU NEED TO KNOW ABOUT THE CYBERSECURITY SOLARIUM COMMISSION REPORT

article

Mar 20, 2020

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response before a major cyber incident occurs, not after. Unlike the original Solarium Commission, which operate...

Read More

The Secrets of Evaluating Security Products THE SECRETS OF EVALUATING SECURITY PRODUCTS

whitepaper

Mar 20, 2020

Cybersecurity technology has become increasingly sophisticated over the last decade. Tools for securing the enterprise are faster and stronger and, as processing speeds have increased, it has become possible to crunch far more data and even apply machine learning to get smart about threat identifica...

Read More

CYBERSECURITY AND CORONAVIRUS: KEEPING YOUR BUSINESS SAFE CYBERSECURITY AND CORONAVIRUS: KEEPING YOUR BUSINESS SAFE

article

Mar 19, 2020

Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybersecurity expert, outlines key challenges and tips for staying secure while away from the office. As...

Read More

Cybersecurity Must Be Embedded in Every Aspect of Government Technology CYBERSECURITY MUST BE EMBEDDED IN EVERY ASPECT OF GOVERNMENT TECHNOLOGY

article

Mar 17, 2020

Cybersecurity has never been more important for every level of our government.The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly advanced cyber skills to exploit both security and the vulnerabilities created by human error. Just last month...

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce A COVID-19 CYBERSECURITY POLL: SECURING A REMOTE WORKFORCE

article

Mar 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a la...

Read More

Critical Gaps Remain in Defense Department Weapons System Cybersecurity CRITICAL GAPS REMAIN IN DEFENSE DEPARTMENT WEAPONS SYSTEM CYBERSECURITY

article

Mar 13, 2020

While the U.S. military is the most effective fighting force in the modern era, it struggles with the cybersecurity of its most advanced weapons systems. In times of crisis and conflict, it is critical that the United States preserve its ability to defend and surge when adversaries employ cyber capa...

Read More

Digital Transformation, Process Safety, and Cybersecurity: The Need for OT Integrity DIGITAL TRANSFORMATION, PROCESS SAFETY, AND CYBERSECURITY: THE NEED FOR OT INTEGRITY

video

Mar 11, 2020

In this video, PAS Global CEO and Founder Eddie Habibi discusses the need for greater OT Integrity in the era of digitalization and increasing cybersecurity risk with Larry O’Brien VP of Research ARC Advisory Group. Learn how actionable information is key to process safety, reliability, and pr...

Read More

Protecting against Cybersecurity Threats when Working from Home PROTECTING AGAINST CYBERSECURITY THREATS WHEN WORKING FROM HOME

article

Mar 11, 2020

With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread work-from-home strategies, data security concerns cannot be forgotten.Empl...

Read More

Malicious coronavirus map hides AZORult info-stealing malware MALICIOUS CORONAVIRUS MAP HIDES AZORULT INFO-STEALING MALWARE

article

Mar 11, 2020

Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware.The malicious online map, foun...

Read More

Ransomware Attack: Top Ransomware February 2020 RANSOMWARE ATTACK: TOP RANSOMWARE FEBRUARY 2020

video

Mar 09, 2020

RANSOMWARE! The dreaded word that is starting to have new DAILY occurrences worldwide. This can happen to YOU! You MUST watch this video to learn how to reduce the risk of getting attacked by ransomware or reducing the severity of it if you do get it .

Read More

Schneider Electric on Open Automation, Cyber Security, & Industry 4.0 SCHNEIDER ELECTRIC ON OPEN AUTOMATION, CYBER SECURITY, & INDUSTRY 4.0

video

Mar 06, 2020

Schneider Electric and ARC discuss industrial automation, smart manufacturing, the digital transformation of industries and workforce empowerment. Collaboration, partnerships and open systems are essential for Industry 4.0 enterprises, manufacturers and machine builders to thrive in the digital econ...

Read More

Findings of CIA hacking Chinese industries FINDINGS OF CIA HACKING CHINESE INDUSTRIES

video

Mar 05, 2020

A report out this week shows possible evidence of U.S. cyberattacks on Chinese companies. Findings by Chinese cybersecurity provider Qihoo 360 says a Central Intelligence Agency (CIA) hacking group has been breaking into key Chinese industries for as many as 11 years. The team behind the discovery t...

Read More

Coronavirus and the Cybersecurity Threat Landscape CORONAVIRUS AND THE CYBERSECURITY THREAT LANDSCAPE

article

Mar 04, 2020

Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will h...

Read More

CISOS PARTICIPATE IN CYBER WARGAMES TO HONE RANSOMWARE RESPONSE PLANS WITH EC-COUNCIL CISOS PARTICIPATE IN CYBER WARGAMES TO HONE RANSOMWARE RESPONSE PLANS WITH EC-COUNCIL

article

Mar 02, 2020

EC-Council, leading global information security certification body, conducted a table-top, cyber wargame among top cybersecurity executives in Tampa, Florida. The sold-out session, “CISO wargame,” included 27 senior executives from the largest managed IT service providers in the United S...

Read More

5G and IoT security: Why cybersecurity experts are sounding an alarm 5G AND IOT SECURITY: WHY CYBERSECURITY EXPERTS ARE SOUNDING AN ALARM

article

Mar 02, 2020

Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in ho...

Read More

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’ NETWORK TRAFFIC ANALYSIS (NTA): A CYBERSECURITY ‘QUICK WIN’

whitepaper

Feb 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention a...

Read More

We Need to Improve Cybersecurity Standards in Space WE NEED TO IMPROVE CYBERSECURITY STANDARDS IN SPACE

article

Feb 27, 2020

Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000 over the next decade. This is part of its ambitious project to provide internet access across t...

Read More

Leveraging Cyber Threat Frameworks, Automation and Terrain Visibility LEVERAGING CYBER THREAT FRAMEWORKS, AUTOMATION AND TERRAIN VISIBILITY

video

Feb 24, 2020

You can’t defend what you don’t understand, so understanding attackers’ motives and the techniques they use is critical. In this video interview with SANS, Fidelis Cybersecurity CTO Craig Harber examines the importance of: -Having holistic visibility and understanding your cyber te...

Read More

Security Operations Maturity Model SECURITY OPERATIONS MATURITY MODEL

whitepaper

Feb 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threa...

Read More

Delivering on the promise of security AI to help defenders protect today’s hybrid environments DELIVERING ON THE PROMISE OF SECURITY AI TO HELP DEFENDERS PROTECT TODAY’S HYBRID ENVIRONMENTS

article

Feb 20, 2020

Technology is reshaping society – artificial intelligence (AI) is enabling us to increase crop yields, protect endangered animals and improve access to healthcare. Technology is also transforming criminal enterprises, which are developing increasingly targeted attacks against a growing range o...

Read More

Security by Sector: Medical IoT Gets Much Needed Dose of Cybersecurity SECURITY BY SECTOR: MEDICAL IOT GETS MUCH NEEDED DOSE OF CYBERSECURITY

article

Feb 20, 2020

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r...

Read More

Cybersecurity in Retail Infographic CYBERSECURITY IN RETAIL INFOGRAPHIC

infographic

Feb 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. P...

Read More

The Future of Cyber: Security and Resilience THE FUTURE OF CYBER: SECURITY AND RESILIENCE

video

Feb 13, 2020

For more than 30 years, the cybersecurity community has worked to increase the effectiveness of our cybersecurity and resilience efforts. Today we face an explosion of devices, the pervasiveness of software, the threat of adversarial capability, and the dependence of national capabilities on the cyb...

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020 3 TRENDS IN DATA PRIVACY BREACH LAWS THAT WILL CARRY OVER TO 2020

article

Feb 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move int...

Read More

Cybersecurity Best Practices Every Enterprise Should Follow in 2020 CYBERSECURITY BEST PRACTICES EVERY ENTERPRISE SHOULD FOLLOW IN 2020

infographic

Feb 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In f...

Read More

Fortinet Security Fabric Enables Digital Innovation FORTINET SECURITY FABRIC ENABLES DIGITAL INNOVATION

whitepaper

Feb 05, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on t...

Read More

AskOptiv: Defending Against AI Weaponized Threats ASKOPTIV: DEFENDING AGAINST AI WEAPONIZED THREATS

article

Feb 05, 2020

2020 is the year for us to seriously consider artificial intelligence (AI) and how it impacts operations, including those involving of threat actors. With all the buzz around the very broad concepts of automation and AI within computer science we should begin by briefly discussing exactly what artif...

Read More

Nine Steps to Cybersecurity NINE STEPS TO CYBERSECURITY

article

Feb 05, 2020

There is no need to say that data security is important. Everybody knows that, everybody agrees. On the other hand, knowledge that ‘admin1’ and ‘password1’ are not strong login credentials is also pretty common…but that doesn’t mean they are not still among the m...

Read More

 8 Essential Elements of a Comprehensive IT Security Strategy 8 ESSENTIAL ELEMENTS OF A COMPREHENSIVE IT SECURITY STRATEGY

whitepaper

Feb 02, 2020

Data breaches represent a very real threat to businesses and individuals alike. Over 76%1 of IT security breaches in 2018 were motivated by opportunities to gain access to private financial information. That means improved IT security measures should be at the forefront of every business owner’s min...

Read More

RUGGEDCOM cybersecurity solutions for Industrial Networks RUGGEDCOM CYBERSECURITY SOLUTIONS FOR INDUSTRIAL NETWORKS

video

Feb 02, 2020

Siemens provides customized cybersecurity solutions that include an integrated portfolio of robust hardware, software and professional services to secure your network. Get the flexibility to safely run Siemens’ own and third party applications from leading cybersecurity companies on the RUGGED...

Read More

Mapping the Known Unknowns of Cybersecurity Education MAPPING THE KNOWN UNKNOWNS OF CYBERSECURITY EDUCATION

article

Feb 02, 2020

Cybersecurity is of increasing importance to societies around the world. This is reflected in national debates, where news stories about breaches, attacks, and policy challenges find their way into the headlines nearly every day. It is also reflected in the curricula of colleges and universities; ma...

Read More

Cybersecurity 2018 CYBERSECURITY 2018

whitepaper

Feb 02, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a to...

Read More

The future of cybersecurity in a digital world THE FUTURE OF CYBERSECURITY IN A DIGITAL WORLD

infographic

Feb 02, 2020

Data-driven technologies change the way the world works. And the more connected devices flourish, the more cybersecurity matters. There are more digitally connected devices than ever before—and the world is just getting started.

Read More

5G choices: a pivotal moment in world affairs 5G CHOICES: A PIVOTAL MOMENT IN WORLD AFFAIRS

article

Jan 30, 2020

It is disappointing that the Brits are doing the wrong thing on 5G, having not exhausted other possibilities. Instead they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk that Chinese intelligence services could use Huawei’s a...

Read More

9 Tips for Cybersecurity with Network Segmentation 9 TIPS FOR CYBERSECURITY WITH NETWORK SEGMENTATION

video

Jan 30, 2020

Description There is no security substitute for network segmentation. Locked doors behind locked doors discourage lazy threat actors and force them to look elsewhere. David Landsberger, Telecom Brokerage Inc. director of training and events, teamed up with CompTIA for a video series on security awar...

Read More

Is your Cybersecurity fit for the future? IS YOUR CYBERSECURITY FIT FOR THE FUTURE?

infographic

Jan 28, 2020

A multi-layered approach works together to not only provide EDR capabilities but also to deliver the strong data and cybersecurity that the NHS aspires to. This is proactive cybersecurity protection that is fit for the future.

Read More

Top 5 cybersecurity threats to the UK healthcare sector TOP 5 CYBERSECURITY THREATS TO THE UK HEALTHCARE SECTOR

article

Jan 28, 2020

The sheer volume and complexity of data held within the UK healthcare sector makes it a challenge from a cybersecurity perspective to keep secure. In fact, research from a survey we conducted recently revealed that 67% of healthcare organizations in the UK have suffered a cybersecurity incident over...

Read More

Cybersecurity with Cloud Computing CYBERSECURITY WITH CLOUD COMPUTING

article

Jan 28, 2020

As more organizations adopt cloud computing, it’s imperative they keep cybersecurity front-of-mind. Some analysts project that public cloud spend could increase to $500 billion by 2023, with infrastructure as one of its largest categories — and industry experts have their eye on security...

Read More

Cyber attacks: it is not a matter of if but when, says New Orleans’ CIO CYBER ATTACKS: IT IS NOT A MATTER OF IF BUT WHEN, SAYS NEW ORLEANS’ CIO

video

Jan 28, 2020

The threat of cyber attacks is growing as cities digitalise their services and use datasets to provide more efficient delivery to citizens. According to the Cisco/Cybersecurity Ventures 2019 Cybersecurity Almanac, governments rank among the most vulnerable sectors for the last five years, alongside ...

Read More

Going Viral: The Challenges & Urgency of Managing TPRM GOING VIRAL: THE CHALLENGES & URGENCY OF MANAGING TPRM

whitepaper

Jan 24, 2020

Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems.It is difficult enough for organizations to manage their own internal vulnerabilities, but even more challenging to ensure that every vendor across their supply chain has strong security practice...

Read More

On Cyber Security and Global Privacy Laws - Adriana Sanford ON CYBER SECURITY AND GLOBAL PRIVACY LAWS - ADRIANA SANFORD

video

Jan 23, 2020

Adriana Sanford is an inspiration around the globe. The award-winning Chilean American cybersecurity and global privacy law expert is an international corporate lawyer, keynote, educator, author, and international television commentator, who appears regularly as a CNN Español analyst to 49 mi...

Read More

Help Your Employees Overcome Cybersecurity Fears by Promoting Cyber Awareness HELP YOUR EMPLOYEES OVERCOME CYBERSECURITY FEARS BY PROMOTING CYBER AWARENESS

infographic

Jan 23, 2020

Increased cyber awareness has never been more important for businesses and consumers, as U.S. data breaches continue to increase at a record pace and are predicted to reach an all-time high of over 1,000 in 2017. This increase seems to have contributed to a growth in consumer concerns, as our recent...

Read More

Cybersecurity Trends to Know in 2019 CYBERSECURITY TRENDS TO KNOW IN 2019

infographic

Jan 22, 2020

A neat infographics to quickly understand the new innovations and emerging technologiesthat are helping organisations strengthen their security practices in 2019. With the number of cyber-incidents on the rise, there is a pressing need to be on top of IT security more than ever. In this infographic,...

Read More

CYBERSECURITY & DATA PRIVACY CYBERSECURITY & DATA PRIVACY

infographic

Jan 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioni...

Read More

CYBER SECURITY EXPOSURES INFOGRAPHIC CYBER SECURITY EXPOSURES INFOGRAPHIC

infographic

Jan 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the c...

Read More

How to Prevent Your Business Being Hacked HOW TO PREVENT YOUR BUSINESS BEING HACKED

article

Jan 16, 2020

During the past two months, I have been approached by four different businesses to help and support them through security breaches that have occurred. In each case, there have been common themes. My concern and frustration arise from the fact that each breach could have easily been prevented by doin...

Read More

Increasing Cybersecurity Skills and Awareness INCREASING CYBERSECURITY SKILLS AND AWARENESS

video

Jan 14, 2020

Keep your cybersecurity skills relevant in 2020. Learn more about the cybersecurity skills gap and how you can take small steps to increase your cybersecurity awareness.

Read More

Understanding Canadian cybersecurity laws: the foundations UNDERSTANDING CANADIAN CYBERSECURITY LAWS: THE FOUNDATIONS

article

Jan 13, 2020

The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure. Cyberspace is playing an undeniably fundamental role in our day-to-day lives and in business operations around ...

Read More

Cybersecurity Threats Call for a Global Response CYBERSECURITY THREATS CALL FOR A GLOBAL RESPONSE

article

Jan 13, 2020

Last March, Operation Taiex led to the arrest of the gang leader behind the Carbanak and Cobalt malware attacks on over 100 financial institutions worldwide. This law enforcement operation included the Spanish national police, Europol, FBI, the Romanian, Moldovan, Belarusian, and Taiwanese authoriti...

Read More

EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL? EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL?

article

Jan 11, 2020

The growth of cybercrime puts businesses and government agencies at the risk of constant threats to their crucial business data, customer data, financial information, and other trade secrets. Cybersecurity professionals play an important role in protecting businesses from cybercriminals. The demand ...

Read More

BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING

article

Jan 10, 2020

The bug bounty initiative is gaining popularity thanks to the shift in security strategies. It has proven to be a great savior from severe vulnerabilities. If cybercriminals find their way to the bug first, they may exploit it for financial gains. Cybersecurity and Infrastructure Agency (CISA) notic...

Read More

Shaun Stalker: Cybersecurity in a Dynamic Ever-Changing World SHAUN STALKER: CYBERSECURITY IN A DYNAMIC EVER-CHANGING WORLD

video

Jan 10, 2020

Insecurity host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s...

Read More

BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS

article

Jan 09, 2020

Every year, millions of dollars of cryptocurrency are stolen from crypto wallets. After thousands of botnet attacks, cybercriminals are now looking for new ways to make money. To this end, the introduction of cryptocurrency mining botnets came about. It is now sold as a service. Recently, French pol...

Read More

Top Cybersecurity Threats in 2020 TOP CYBERSECURITY THREATS IN 2020

article

Jan 08, 2020

A host of new and evolving cybersecurity threats has the information security industry on high alert. Ever-more sophisticated cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrency and more have placed the data and assets of corporations, governments a...

Read More

How has the world of cybersecurity evolved in the last decade? HOW HAS THE WORLD OF CYBERSECURITY EVOLVED IN THE LAST DECADE?

video

Jan 03, 2020

Gearoid Terry, vice-president of enterprise cybersecurity at Fidelity Investments, draws on his wealth of experience in the growing field to give his take on the most pressing cybersecurity threats for enterprises today and the steps organisations need to take to combat them.

Read More

Hospitality Company Landry HOSPITALITY COMPANY LANDRY'S INC. IDENTIFIES MALWARE ON PAYMENT SYSTEM

article

Jan 02, 2020

Landry's, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment and gaming corporation, has reported that it identified malware on its payment processing system. Headquartered in Houston, Texas. Landry's, Inc. owns and operates more than 600 restaurants, hotels, ...

Read More

Make These Security New Year’s Resolutions to Bolster Your Cybersecurity in 2020 MAKE THESE SECURITY NEW YEAR’S RESOLUTIONS TO BOLSTER YOUR CYBERSECURITY IN 2020

article

Jan 01, 2020

The new year has arrived, and with glasses raised and timeless stories recounted, we can now look to that well-meaning but often short-lived practice we know too well: setting resolutions.Industry leaders often make fulsome commitments to changing systems for the better, fully intending to carry thr...

Read More

Here are the top cybersecurity predictions for 2020 HERE ARE THE TOP CYBERSECURITY PREDICTIONS FOR 2020

article

Dec 27, 2019

As 2019 comes to an end, cybersecurity experts are preparing for a new year—and a new decade—and all the cyber scams, breaches, attacks and privacy concerns that threaten consumers and businesses. CyberScout, an industry leader in cyber insurance, data security, and identity theft protec...

Read More

Cybersecurity Benchmarking & Security Performance Management CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT

whitepaper

Dec 27, 2019

Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems. The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide accurate data...

Read More

Cybersecurity Benchmarking & Security Performance Management CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT

whitepaper

Dec 27, 2019

Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems.The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide ac...

Read More

EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY

article

Dec 26, 2019

Cyberthreat actors are individuals or groups who work with the malicious intent of taking advantage of vulnerabilities and gaining unauthorized access to information systems. They intend to affect the victim’s data, systems, networks, or devices. The internet is an effective tool that they use...

Read More

Dangers of new tech: Top cybersecurity trends that will shape 2020 DANGERS OF NEW TECH: TOP CYBERSECURITY TRENDS THAT WILL SHAPE 2020

article

Dec 26, 2019

As we HEAD into a new decade, there’s no doubt that attackers will try to use innovation against us but determining where they will focus is always a challenge. Here are the top security trends that will impact both businesses and consumers in 2020. Drones open up new pathway for intelligence ...

Read More

Healthcare Cybersecurity: Reducing the Risk of Data Breaches HEALTHCARE CYBERSECURITY: REDUCING THE RISK OF DATA BREACHES

article

Dec 22, 2019

2019 has a bad year for healthcare security breaches. Over 30 million patients in the U.S. have been affected by data breaches so far this year. The majority of attacks have been traced back to third-party vendors and phishing attacks. Furthermore, the industry at large is still dragging its heels o...

Read More

PROMOTING BETTER CYBERSECURITY PROMOTING BETTER CYBERSECURITY

whitepaper

Dec 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have...

Read More

Ransomware Risk Management: 11 Essential Steps RANSOMWARE RISK MANAGEMENT: 11 ESSENTIAL STEPS

article

Dec 18, 2019

There's been a lot of discussion within the InfoSec community about ransomware - why it has been increasing, whether ransoms should be paid and how to mitigate this rapidly growing threat. The culprit that opens the door to these attacks, apparently including last week's city of New Orleans ...

Read More

Cybersecurity experts explain their work to children CYBERSECURITY EXPERTS EXPLAIN THEIR WORK TO CHILDREN

video

Dec 18, 2019

Everyone occasionally has difficulties communicating, even when talking about the topics you’re expert in, and even explaining them to adults. Explaining cybersecurity concepts to children adds layers of complexity, but it’s important to understand the risks behind ignorance.

Read More

Decade retrospective: Cybersecurity from 2010 to 2019 DECADE RETROSPECTIVE: CYBERSECURITY FROM 2010 TO 2019

article

Dec 18, 2019

Yes, technically, decades begin in years that end in one, but it's easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn't work. Devices blew up due to malware or adware, and users got annoyed whe...

Read More

Almost half of companies say cybersecurity readiness has improved in the past year ALMOST HALF OF COMPANIES SAY CYBERSECURITY READINESS HAS IMPROVED IN THE PAST YEAR

infographic

Dec 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were re...

Read More

Closing a Critical Gap in Cybersecurity CLOSING A CRITICAL GAP IN CYBERSECURITY

article

Dec 16, 2019

Last year, faced with rising threats in cyberspace, Congress established the nation’s first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). We serve as the nation’s risk adviser, which means we’re the agency responsible for working w...

Read More

THE ROLE OF AI IN CYBERSECURITY THE ROLE OF AI IN CYBERSECURITY

article

Dec 13, 2019

Emerging technologies put cybersecurity at risk. Even the new advancements in defensive strategies of security professionals fail at some point. Besides, as offensive-defensive strategies and innovations are running in a never-ending cycle, the complexity and volume of cyberattacks have increased. C...

Read More

Cybersecurity Whitepaper 2018 CYBERSECURITY WHITEPAPER 2018

whitepaper

Dec 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats ...

Read More

Machine Learning in Cybersecurity: 7 Questions for Decision Makers MACHINE LEARNING IN CYBERSECURITY: 7 QUESTIONS FOR DECISION MAKERS

video

Dec 12, 2019

April Galyardt, Angela Horneman, and Jonathan Spring discuss seven key questions that managers and decision makers should ask about machine learning to effectively solve cybersecurity problems.

Read More

Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud MAINTAIN CONTROL OF YOUR MOST SENSITIVE CONTENT WITH A PRIVATE OR ON-PREMISES CLOUD

article

Dec 12, 2019

Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price is forgotten.” The desire to spend less and save more is essentially a survival insti...

Read More

How to test employee cyber competence through pen-testing HOW TO TEST EMPLOYEE CYBER COMPETENCE THROUGH PEN-TESTING

article

Dec 11, 2019

Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help get supposedly ill-gotten cash out of their own country into a safe bank, offering a percentage of the money for their participation. While “Nigerian prince” emails have been scamming people...

Read More

NIST Cybersecurity Framework NIST CYBERSECURITY FRAMEWORK

video

Dec 10, 2019

The NIST Cybersecurity Framework centers on five controls, Identify, Protect, Detect, Respond, and Recover.

Read More

CYBERSECURITY AND AI IN TODAY’S WORLD CYBERSECURITY AND AI IN TODAY’S WORLD

article

Dec 10, 2019

In an always advancing cyber threat landscape where antivirus programming and firewalls are viewed as tools of antiquity, companies are currently searching for all the more technologically advanced methods for protecting classified and sensitive data. Artificial intelligence (AI) is accepting the si...

Read More

Digital Privacy vs. Cybersecurity: The Confusing Complexity of Information Security in 2020 DIGITAL PRIVACY VS. CYBERSECURITY: THE CONFUSING COMPLEXITY OF INFORMATION SECURITY IN 2020

article

Dec 04, 2019

There is a small and potentially tumultuous revolution building on the horizon of 2020. Ironically, it’s a revolution very few people on the street are even aware of but literally every single corporation around the globe currently sits in finger-biting, hand-wringing anticipation: is it ready...

Read More

A Lifeline: Patient Safety and Cybersecurity A LIFELINE: PATIENT SAFETY AND CYBERSECURITY

whitepaper

Dec 03, 2019

Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line.

Read More

A strong cybersecurity strategy for device manufacturers A STRONG CYBERSECURITY STRATEGY FOR DEVICE MANUFACTURERS

video

Dec 03, 2019

The Thales Trusted Key Manager delivers the industry’s most advanced encryption tools and provides a security interface that interactes with a variety of IoT platforms through APIs. A unique platform to manage the security of large fleets of devices from various manufacturers.

Read More

How AI is Transforming the Cybersecurity Landscape  Gabriel Tremblay HOW AI IS TRANSFORMING THE CYBERSECURITY LANDSCAPE GABRIEL TREMBLAY

video

Dec 02, 2019

In this episode of Devo Talks, our guest Gabriel Tremblay shares some insight on how his company, Delve Labs is using artificial intelligence to tackle cybersecurity. Before Gabriel was CEO of Delve Labs, he had the opportunity to help organize and start NorthSec, the largest cybersecurity conferenc...

Read More

61% of malicious ads target Windows users 61% OF MALICIOUS ADS TARGET WINDOWS USERS

article

Dec 02, 2019

Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon. The company said that based on data gathered by its internal tools, 61% of the malicious ads they've observed from between July 11 and November 22, 2019 were ...

Read More

What Does IMDRF WHAT DOES IMDRF'S NEW CYBERSECURITY GUIDANCE MEAN FOR YOU?

article

Dec 02, 2019

In the age of connectivity, cybersecurity has become critical to all stakeholders in the medical device field. Different federal agencies in the United States (U.S.), as well as agencies across the globe, have begun to address this issue through regulatory guidance and enforcement action. The U.S. h...

Read More

Cyber Security What Makes a Strong Password CYBER SECURITY WHAT MAKES A STRONG PASSWORD

infographic

Dec 01, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Warring State - China WARRING STATE - CHINA'S CYBERSECURITY STRATEGY

whitepaper

Dec 01, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generat...

Read More

DeltaV SIS™ and Cybersecurity DELTAV SIS™ AND CYBERSECURITY

whitepaper

Nov 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for...

Read More

Tech SA: UTSA could benefit from cybersecurity bill TECH SA: UTSA COULD BENEFIT FROM CYBERSECURITY BILL

video

Nov 26, 2019

A bill would allow DHS to work with five universities to train state and local governments on cybersecurity.

Read More

GuardSight - NIST Cybersecurity Framework GUARDSIGHT - NIST CYBERSECURITY FRAMEWORK

video

Nov 26, 2019

GuardSight is a cybersecurity consulting firm and an established provider of specialized cybersecurity services. Our cybersecurity protection packages, automation, and data science techniques compliment our elite and reliable cybersecurity experts.

Read More

The Importance of Cybersecurity Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY THREAT DETECTION FOR UTILITIES

whitepaper

Nov 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

Cybersecurity reporter debunks Trump CYBERSECURITY REPORTER DEBUNKS TRUMP'S CROWDSTRIKE CLAIMS

video

Nov 25, 2019

New York Times cybersecurity reporter Nicole Perlroth speaks to CNN's Jim Sciutto about CrowdStrike conspiracy theories and how they relate not only to the 2016 presidential election, but the upcoming 2020 race as well.

Read More

4G to 5G Migration - The Changing Role of Security  5G Cybersecurity 4G TO 5G MIGRATION - THE CHANGING ROLE OF SECURITY 5G CYBERSECURITY

video

Nov 21, 2019

Fortinet’s security solutions for 4G and 5G provide a common set of security tools and solutions enabling a safe transition from 4G to 5G and the secure delivery of 5G’s unique use cases such as MEC and Network Slicing.

Read More

Think Auburn: Cybersecurity THINK AUBURN: CYBERSECURITY

video

Nov 20, 2019

Auburn University and the Samuel Ginn College of Engineering are taking the lead as an institution on the forefront of cybersecurity research and professional preparedness in the industry.

Read More

Cybersecurity: We Are All Stakeholders CYBERSECURITY: WE ARE ALL STAKEHOLDERS

video

Nov 20, 2019

According to Scott Jamar, VP of Industry Relations, the best approach to security is to view all networks as potential risks. When it comes to cybersecurity, we all have roles to play.

Read More

Skeye - Cybersecurity for Medical Devices SKEYE - CYBERSECURITY FOR MEDICAL DEVICES

video

Nov 19, 2019

Skeye is a vendor-agnostic cybersecurity solution for networked medical devices that leverages medical device expertise, artificial intelligence, systematic processes, and security professionals to help keep your medical devices resilient in the face of cybersecurity risk.

Read More

Alex Stamos: Creating a Thorough Cyber Defense System ALEX STAMOS: CREATING A THOROUGH CYBER DEFENSE SYSTEM

video

Nov 19, 2019

Alex Stamos is the former Chief of Security at Facebook & an adjunct Professor at Stanford. Stamos is a cybersecurity expert, business leader and entrepreneur whose career has focused on improving the security and safety of the Internet. In this video, Stamos talks about the US's offensive a...

Read More

2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS 2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS

article

Nov 19, 2019

Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a ...

Read More

SMART CITIES AND CYBERSECURITY: THE ESSENTIALS SMART CITIES AND CYBERSECURITY: THE ESSENTIALS

article

Nov 19, 2019

With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag...

Read More

VA continues to struggle with information security, watchdogs say VA CONTINUES TO STRUGGLE WITH INFORMATION SECURITY, WATCHDOGS SAY

article

Nov 15, 2019

Two watchdog agencies told lawmakers Thursday that the Veterans Affairs Department continues to struggle with cybersecurity issues, despite recent improvements. Audits have identified numerous information security vulnerabilities—and insufficient attempts to remedy them—at the VA, leader...

Read More

MEASURING ORGANIZATION’S CYBERSECURITY MEASURING ORGANIZATION’S CYBERSECURITY

article

Nov 15, 2019

No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought...

Read More

Cybersecurity: Are Nation State cybersecurity threats real? CYBERSECURITY: ARE NATION STATE CYBERSECURITY THREATS REAL?

video

Nov 14, 2019

Brad Prent, senior security consultant, ENCS discusses the nation state cybersecurity threats, the steps the energy industry can take to protect itself and the future evolution of cybersecurity.

Read More

Balancing Patient Engagement and Awareness with Medical Device Cybersecurity BALANCING PATIENT ENGAGEMENT AND AWARENESS WITH MEDICAL DEVICE CYBERSECURITY

article

Nov 14, 2019

Medical devices are increasingly more advanced and interconnected, sharing information via Wi-Fi, the internet, our phones and across hospital networks. While the software and networking features behind these devices can support safer, more convenient and timely health care delivery, they also can i...

Read More

Cyber Security: Defending your digital business CYBER SECURITY: DEFENDING YOUR DIGITAL BUSINESS

whitepaper

Nov 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, busin...

Read More

Enterprises Need to Focus on Cybersecurity Strategies Around 5G ENTERPRISES NEED TO FOCUS ON CYBERSECURITY STRATEGIES AROUND 5G

article

Nov 13, 2019

Companies need to implement technologies like virtualization and automation to protect themselves from cyber threats that 5G will bring. AT&T has prepared the report after surveying 704 security practitioners from North America, Australia, and the UK, to know how prepared enterprises are for the...

Read More

Tips for Staying Safe Online TIPS FOR STAYING SAFE ONLINE

article

Nov 12, 2019

Almost one-fifth of organisations in Ireland have reported at least one technology-related security incident in the last 12 months. According to the Central Statistics Office (CSO), these attacks can have significant consequences, with 5% reporting that it resulted in the destruction or corruption o...

Read More

Hyperspecialization in cybersecurity Cyber Work Podcast HYPERSPECIALIZATION IN CYBERSECURITY CYBER WORK PODCAST

video

Nov 11, 2019

John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding.

Read More

AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G AT&T CYBERSECURITY INSIGHTS™ REPORT: SECURITY AT THE SPEED OF 5G

article

Nov 11, 2019

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in ...

Read More

How we can make Americans safer online HOW WE CAN MAKE AMERICANS SAFER ONLINE

article

Nov 11, 2019

Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of time and energy has been devoted to improving cybersecurity and cyber hygiene. Sadly, despite thos...

Read More

Councils lack resources to manage cyber threats COUNCILS LACK RESOURCES TO MANAGE CYBER THREATS

article

Nov 11, 2019

Local Government Professionals Australia has made a submission to the federal government’s 2020 Cyber Security Strategy identifying ways it can support local government. A report surveying local government CEOs and general managers, JLT Public Sector Risk Report 2019, by risk consultancy JLT i...

Read More

GBM Security Whitepaper GBM SECURITY WHITEPAPER

whitepaper

Nov 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation ...

Read More

Cybersecurity and Cyber Resilience Perception Gaps CYBERSECURITY AND CYBER RESILIENCE PERCEPTION GAPS

video

Nov 10, 2019

Protecting IT against cyber threats is a strategic priority for businesses. But as IT ecosystems grow beyond the four walls of your organization, there may be a number of grey areas on security and resilience responsibilities.

Read More

Master of Science in Cybersecurity Law MASTER OF SCIENCE IN CYBERSECURITY LAW

video

Nov 08, 2019

Markus Rauschecker, Director of the Cybersecurity Program at Maryland Carey Law's Center for Health and Homeland Security discusses the Master of Science in Law program.

Read More

Is Working in Cybersecurity Fun? IS WORKING IN CYBERSECURITY FUN?

video

Nov 07, 2019

I share what cybersecurity professionals had to say about what they found fun and enjoyable in their work.

Read More

Protect the Business from Edge to AI with Cloudera Cybersecurity PROTECT THE BUSINESS FROM EDGE TO AI WITH CLOUDERA CYBERSECURITY

article

Nov 07, 2019

Gartner estimates 30x connected device growth by 2020. Faster 5G networks bringing an explosion of inexpensive, connected devices. This enables new and more innovative applications and capabilities to improve customer experience. However, all these new applications and connections also broaden the n...

Read More

10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME 10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME

article

Nov 06, 2019

When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year. Being cautious while tending to financial transactions won’t ensure that you are cyber safe. ...

Read More

IoT Cybersecurity vision 2018-2019 IOT CYBERSECURITY VISION 2018-2019

whitepaper

Nov 06, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by s...

Read More

This Website Has Solved Cybersecurity THIS WEBSITE HAS SOLVED CYBERSECURITY

article

Nov 06, 2019

Big companies that hold our personal data get hacked almost every day, but most don’t really know how to deal with getting hacked, especially when it comes to telling users what happened. If you’ve read some data breach disclosures or notices, you know the classic “we take your pri...

Read More

Get Out! The FUD Is Coming from the Inside GET OUT! THE FUD IS COMING FROM THE INSIDE

article

Nov 05, 2019

On LinkedIn, Ron C. of CoreSolutions Software said, “Cybersecurity is no longer just a technical problem. It’s now more of a people problem! So why aren’t businesses prioritizing security awareness training for their staff?” There was a massive response and mixed agreement. R...

Read More

Insider tips from a cybersecurity CEO  Cyber Work Podcast INSIDER TIPS FROM A CYBERSECURITY CEO CYBER WORK PODCAST

video

Nov 04, 2019

Scott Madsen, CEO of Cingo Solutions, and Cyber Work host Chris Sienko discuss transferring into cybersecurity from another career, the importance of transparency in job listings and ways to fix the cyber skills gap.

Read More

Healthcare cyberattacks raise questions about cybersecurity training HEALTHCARE CYBERATTACKS RAISE QUESTIONS ABOUT CYBERSECURITY TRAINING

article

Nov 04, 2019

A recent search showed the Office for Civil Rights was investigating 548 such breaches in the last 24 months. These included health information breaches at hospitals, cancer centers, hospice facilities, group practices and more.Perhaps as concerning as the rate at which these healthcare cyberattacks...

Read More

A Security Failure in the White House A SECURITY FAILURE IN THE WHITE HOUSE

article

Nov 01, 2019

At the time, ODNI predicted similar Russian efforts in the future. That prediction has come to pass: The FBI has reported Russian efforts against the 2020 elections. Nor are they the only ones taking aim at U.S. elections. Facebook recently found evidence of Iranian operations against the Trump camp...

Read More

Cybersecurity made simple: five steps SMEs can take to guard against attack CYBERSECURITY MADE SIMPLE: FIVE STEPS SMES CAN TAKE TO GUARD AGAINST ATTACK

article

Oct 31, 2019

Cybersecurity can be an intimidating subject for many small and medium businesses because the threats are so varied, from email fraud and ransomware infections to data breaches. But behind the technical descriptions of the types of risks, there are actually some simple, straightforward actions you c...

Read More

Mimecast: Tackling Cybersecurity in a connected economy MIMECAST: TACKLING CYBERSECURITY IN A CONNECTED ECONOMY

article

Oct 31, 2019

Mimecast, founded in 2003, is an international cyber resilience company, with offices in the UK, US, South Africa, Australia, Europe and the Middle East. Mimecast uses dispersed data centers, intelligent mail routing and robust cloud security to provide a security network capable of managing over 35...

Read More

Tips to Protect It: National Cybersecurity Awareness Month TIPS TO PROTECT IT: NATIONAL CYBERSECURITY AWARENESS MONTH

video

Oct 30, 2019

Held every October, National Cybersecurity Awareness Month is a collaborative effort between the government and the industry to raise awareness about the importance of cybersecurity and to provide the resources we need to be safer and more secure online. In our short video series, we'll be givin...

Read More

Insider Threats: A Problem That is Preventable INSIDER THREATS: A PROBLEM THAT IS PREVENTABLE

article

Oct 30, 2019

Earlier this summer, I read a fascinating story about McAfee launching a lawsuit against three former employees. The lawsuit alleged that these employees conspired to steal trade secrets on behalf of their new employer, accusing them of moving to a competitor and exfiltrating business-sensitive docu...

Read More

Say It Loud! I Didn’t Read the Privacy Policy and I’m Proud! SAY IT LOUD! I DIDN’T READ THE PRIVACY POLICY AND I’M PROUD!

article

Oct 29, 2019

We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. W...

Read More

2019 Top Three Privacy Trends in US Lawmaking 2019 TOP THREE PRIVACY TRENDS IN US LAWMAKING

article

Oct 29, 2019

The original version of this blog, excluding NICE references, was initially published in Lydia de la Torre's Medium Blog. The version below has been extensively edited. The original version can be accessible here. The year 2019 began with a significant increase in bill introductions at the State...

Read More

What Do Hurricanes and Cybersecurity Have in Common? WHAT DO HURRICANES AND CYBERSECURITY HAVE IN COMMON?

article

Oct 29, 2019

With hurricanes intensifying, it’s not hard to imagine this scenario: it’s early October and the Weather Channel is extensively covering a hurricane that’s going to hit the East Coast of the United States in five days. Right now, it’s just a tropical storm somewhere near Cuba...

Read More

The Future of AI in Cybersecurity THE FUTURE OF AI IN CYBERSECURITY

article

Oct 29, 2019

The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed on products ranging from smartwatches to washing machines and of course every security tool on the market. Advertisements lead us to believe that if you couldn’t find a way t...

Read More

2020 Cyber Security Trends You Should Be Aware Of 2020 CYBER SECURITY TRENDS YOU SHOULD BE AWARE OF

article

Oct 28, 2019

Cybersecurity is a fast-evolving game of wits where hackers and defenders continue to outmanoeuvre one another. Staying up to date with the latest trends in cybersecurity is not only beneficial; it’s imperative for everyone involved. Large-scale data breaches always make it to the headlines &n...

Read More

Will AI Driven Cyber Security Help Stop Malicious Attacks? WILL AI DRIVEN CYBER SECURITY HELP STOP MALICIOUS ATTACKS?

article

Oct 24, 2019

In this era of modern technology, cyber-attacks occur in many cases and are predominant than ever before. Artificial Intelligence in cyber security has been helping IT professionals to predict and block the cyber-attacks more effectively. AI has shaken the cybersecurity industry with its astonishing...

Read More

How America HOW AMERICA'S CYBER STRATEGY COULD CREATE AN INTERNATIONAL CRISIS

article

Oct 23, 2019

The United States has adopted a new cyber warfare strategy focused on “persistent engagement” and “forward defense” in an attempt to thwart Chinese, Russian and other state-sponsored cyber attacks. While this unprecedented “defend forward” approach gives America m...

Read More

Avast target of cyber-security attack, company and Czech counterintelligence say AVAST TARGET OF CYBER-SECURITY ATTACK, COMPANY AND CZECH COUNTERINTELLIGENCE SAY

article

Oct 22, 2019

Czech-based Avast and Czech counterintelligence service BIS said on Monday they had detected a network attack on the cyber-security company which the BIS suspected of originating in China. Avast said in a blog post that it found suspicious behaviour on its network on Sept. 23 and opened an investiga...

Read More

Cybersecurity: a crucial issue for industry and transport stakeholders CYBERSECURITY: A CRUCIAL ISSUE FOR INDUSTRY AND TRANSPORT STAKEHOLDERS

article

Oct 21, 2019

Cybersecurity is defined as all the technical and non-technical measures of protection that enable an information system to withstand events liable to compromise the availability, integrity, confidentiality or associated proofs (identity, authenticity, traceability) of data stored, processed or tran...

Read More

Scott Schober discusses the state of cybersecurity SCOTT SCHOBER DISCUSSES THE STATE OF CYBERSECURITY

video

Oct 21, 2019

CGTN's Elaine Reyes spoke with Scott Schober, president and CEO of Berkeley Varitronics Systems, discusses U.S. cybersecurity in America, China and around the world, vulnerabilities and its future.

Read More

Former Twitter CISO on IT security hiring and cybersecurity FORMER TWITTER CISO ON IT SECURITY HIRING AND CYBERSECURITY

video

Oct 20, 2019

Michael Coates, CEO and co-founder of Altitude Networks and the former CISO at Twitter, shares best practices for building strong security teams and for starting a career in cybersecurity.

Read More

US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns US DOD COMMENTS ON HUAWEI, HIKVISION, DAHUA CYBER SECURITY CONCERNS

video

Oct 16, 2019

Can you talk a little bit about the Department of Defense's concerns about cybersecurity as it relates to the PRC? Last year in the NDAA there was a ban for Huawei, Hikvision, and Dahua. So is the Department of Defense concerned about companies and organizations that might have influence by the ...

Read More

What is cybersecurity? WHAT IS CYBERSECURITY?

article

Oct 13, 2019

Cybersecurity, or computer security, is the protection of computer systems from the theft or damage to their hardware, software, of electric data, as well as form the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance to computer s...

Read More

Cyber Report: What Is Cyber Security? CYBER REPORT: WHAT IS CYBER SECURITY?

video

Oct 12, 2019

October is National Cyber Security Awareness Month and on this first episode of the Cyber Report, sponsored by Northrop Grumman Cyber & Intelligence Mission Solutions, Matt Jorgenson talks to Defense & Aerospace Report Editor Vago Muradian about what cyber security is and why it matters.

Read More

The C-Suite and Cybersecurity THE C-SUITE AND CYBERSECURITY

video

Oct 11, 2019

Attendees at this year’s WSJ Pro Cybersecurity Executive Summit in London gathered to discuss hot-button issues for cybersecurity. This video looks at how the responsibilities of the C-suite have evolved in response to the increasing importance of cybersecurity.

Read More

Mobile Cybersecurity Tips from Emery Csulak, DOE Chief Information Security Officer MOBILE CYBERSECURITY TIPS FROM EMERY CSULAK, DOE CHIEF INFORMATION SECURITY OFFICER

video

Oct 11, 2019

Our heavy reliance on mobile devices to communicate means we must make mobile cybersecurity a top priority both at home and at work! Learn how DOE is prioritizing mobile cybersecurity by providing tips to stay safe and secure.

Read More

McAleenan speaks at cybersecurity event MCALEENAN SPEAKS AT CYBERSECURITY EVENT

video

Oct 10, 2019

FOX News operates the FOX News Channel (FNC), FOX Business Network (FBN), FOX News Radio, FOX News Headlines 24/7, FOXNews.com and the direct-to-consumer streaming service, FOX Nation. FOX News also produces FOX News Sunday on FOX Broadcasting Company and FOX News Edge.

Read More

Cybersecurity for Financial Institutions CYBERSECURITY FOR FINANCIAL INSTITUTIONS

video

Oct 09, 2019

As a bank or financial institution, you work with sensitive data every day. You likely have extensive files with account information, FEIN numbers, financial reports, and more. If you get hacked, each and every one of your customers could be affected. This is an easy way to lose the trust you’...

Read More

How to Get Involved in Cybersecurity with Lidia Giuliano HOW TO GET INVOLVED IN CYBERSECURITY WITH LIDIA GIULIANO

video

Oct 08, 2019

Lidia Giuliano, Principle Security Consultant at Pulcino Security, shares how she built her career in cybersecurity, how she stays involved, and her biggest piece of advice for those looking to get started in the industry.

Read More

How Cloud Computing is Changing Cybersecurity HOW CLOUD COMPUTING IS CHANGING CYBERSECURITY

article

Oct 07, 2019

As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do amazing things with web-delivered technologies. However, one of the biggest issues around the cloud has always been, and still is, cybersecurity. (Read The Truth About Cybersecurity.)The clou...

Read More

What every CEO needs to know about Cybersecurity WHAT EVERY CEO NEEDS TO KNOW ABOUT CYBERSECURITY

video

Oct 05, 2019

Mathew Moynahan, CEO of Forcepoint explains what every CEO needs to know about cybersecurity. According to him, external protection isn't enough and it is paramount to empower teams to fight threats. EMIR is the Middle East's most influential corporate intelligence network for CEOs and gover...

Read More

ZTE Cybersecurity White Paper ZTE CYBERSECURITY WHITE PAPER

whitepaper

Oct 04, 2019

The 5G era has been started. Technologies like cloud computing, the Internet of Things (IoT), big data, and AI are gradually booming in the market. These new technologies bring about a new industry revolution together with significant cybersecurity concerns.

Read More

Infographic: Manage Banking Consumers INFOGRAPHIC: MANAGE BANKING CONSUMERS' TOP CYBERSECURITY FEARS

infographic

Oct 04, 2019

CSI and Harris Poll recently surveyed 2,000 Americans nationwide about their opinions and fears surrounding cybersecurity as it pertains to their personal financial data.

Read More

Ninth Annual Cost of Cybercrime Study NINTH ANNUAL COST OF CYBERCRIME STUDY

infographic

Oct 02, 2019

The Ninth Annual Cost of Cybercrime study combines research across 11 countries in 16 industries. We interviewed 2,647 senior leaders from 355 companies and drew on the experience and expertise of Accenture Security to examine the economic impact of cyberattacks.

Read More

31 DAYS OF ONLINE SECURITY TIPS 31 DAYS OF ONLINE SECURITY TIPS

infographic

Oct 02, 2019

We’ve written a few articles recently about cybersecurity because we feel this area is often neglected by otherwise security-conscious individuals. Even if you’re not a tech expert who spends most of the day working with computers, the internet has become an inseparable part of our daily...

Read More

Build your career with our Cybersecurity and Technology Risk team BUILD YOUR CAREER WITH OUR CYBERSECURITY AND TECHNOLOGY RISK TEAM

video

Oct 02, 2019

Are you searching for a career in Cybersecurity? GE Aviation is hiring! Our Cybersecurity and Technology Risk team is actively searching for talent to add to our growing team and help protect GE Aviation’s critical assets. Watch here as Senior Executive of Risk & Compliance, Deneen DeFiore...

Read More

Benefits of Using a Managed Services Provider for Cybersecurity BENEFITS OF USING A MANAGED SERVICES PROVIDER FOR CYBERSECURITY

video

Oct 02, 2019

When you talk to business leaders and owners of all sizes there appears to be one key business concern and challenge cybersecurity and compliance. Threats are arising inside and outside a company’s network, across all industries, making businesses more aware of their exposure to hacking attemp...

Read More

Cyber Security Awareness Month starts today CYBER SECURITY AWARENESS MONTH STARTS TODAY

article

Oct 01, 2019

For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year Halloween. However, it’s time not only to prepare for all things spooky. Far from it October is also a month dedicated to a subject that, if ig...

Read More

New U.N. Debate on Cybersecurity in the Context of International Security NEW U.N. DEBATE ON CYBERSECURITY IN THE CONTEXT OF INTERNATIONAL SECURITY

article

Sep 30, 2019

In 2018, the United Nations General Assembly voted to establish two separate groups to study international law and norms in relation to cyberspace. Resolution 73/27—proposed by a number of countries, including Russia—created an open-ended working group (OEWG) on the subject. Another grou...

Read More

Cylance is golden: BlackBerry’s new cybersecurity R&D lab is all about AI and IoT CYLANCE IS GOLDEN: BLACKBERRY’S NEW CYBERSECURITY R&D LAB IS ALL ABOUT AI AND IOT

article

Sep 30, 2019

BlackBerry has announced a new business unit dedicated entirely to cybersecurity research and development (R&D).The BlackBerry Advanced Technology Development Labs (BlackBerry Labs) will “operate at the forefront” of cybersecurity R&D, according to BlackBerry. The unit will be sp...

Read More

Digital transformation and cybersecurity (RGB) DIGITAL TRANSFORMATION AND CYBERSECURITY (RGB)

infographic

Sep 29, 2019

As companies embrace technologies such as the Internet of Things, big data, cloud, and mobility, security must be more than an afterthought. But in the digital era, the focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud.

Read More

Assembling cybersecurity: The politics and
materiality of technical malware reports and the case
of Stuxnet ASSEMBLING CYBERSECURITY: THE POLITICS ANDMATERIALITY OF TECHNICAL MALWARE REPORTS AND THE CASEOF STUXNET

whitepaper

Sep 26, 2019

This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success...

Read More

Military Cyber Security: Danish Parliamentary Hearing MILITARY CYBER SECURITY: DANISH PARLIAMENTARY HEARING

video

Sep 25, 2019

On 11 September 2019, the Defence Committee of the Danish Parliament hosted a public hearing on the military aspects of cyber security to help launch my book, Understanding Cybersecurity.

Read More

Wait… What? Good News in Cybersecurity? WAIT… WHAT? GOOD NEWS IN CYBERSECURITY?

article

Sep 24, 2019

We simply don’t hear enough good news cybersecurity stories that make those involved proud. What are the cybersecurity stories that aren’t being told publicly that should be? Michael Farnum, Set Solutions, said, “If you come into the job and aren’t willing to critically revie...

Read More

The Good for Texas Cybersecurity Tour: Andrew Rodriguez THE GOOD FOR TEXAS CYBERSECURITY TOUR: ANDREW RODRIGUEZ

video

Sep 24, 2019

Student Andrew Rodriguez describes how closely the cybersecurity program at UTSA has aligned with his experience as an intern at our agency. See how higher education programs in Texas are responding to the need for a cybersecurity workforce in Texas.

Read More

Encryption Backdoors What it Means for Machines and Cybersecurity ENCRYPTION BACKDOORS WHAT IT MEANS FOR MACHINES AND CYBERSECURITY

video

Sep 24, 2019

The biggest debate in cybersecurity today - should governments implement encryption backdoors? Venafi's CEO Jeff Hudson explains what this would mean for the security of some of our safest tech - from self-driving cars to nuclear reactors, and all machines that are on the internet. Venafi - inve...

Read More

The Cyber Risk to Food Processing and Manufacturing THE CYBER RISK TO FOOD PROCESSING AND MANUFACTURING

whitepaper

Sep 20, 2019

Almost every week brings news of a new cybersecurity incident. These typically effect companiesand organizations in the financial, retail, or healthcare industries or, more recently, state and localgovernments. They also usually involve data breaches or other attacks that affect informationtechnolog...

Read More

The Cybersecurity Blueprint THE CYBERSECURITY BLUEPRINT

whitepaper

Sep 20, 2019

Cybercrime has grown costlier over the past few years. Ponemon Institute found the average cost of a data breach for businesses was $3.86 million USD per incident1 . Security incidents also affect a large portion of businesses. A study from Thales Security found 70% of their respondents in the Unite...

Read More

Preparing For Physical and Cybersecurity Convergence PREPARING FOR PHYSICAL AND CYBERSECURITY CONVERGENCE

article

Sep 20, 2019

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private se...

Read More

10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ 10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ

article

Sep 19, 2019

GCHQ, the Government Communications Headquarters is an intelligence and security agency responsible for keeping the U.K. safe. The team of GCHQ uses cutting-edge technology, technical ingenuity, and wide-ranging partnerships to identify, analyze, and disrupt threats. GCHQ deals with real threats tha...

Read More

5 Tips and Tricks to Boost Small Business Security 5 TIPS AND TRICKS TO BOOST SMALL BUSINESS SECURITY

article

Sep 19, 2019

Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Many small business owners think they're safe from hackers. After all, wh...

Read More

5 Tips & Tricks That Boost Small Business Security 5 TIPS & TRICKS THAT BOOST SMALL BUSINESS SECURITY

article

Sep 19, 2019

Keep your small business safe from hackers using these cybersecurity tips. Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Ma...

Read More

Cybersecurity for Distributed Energy Resources and SCADA Systems CYBERSECURITY FOR DISTRIBUTED ENERGY RESOURCES AND SCADA SYSTEMS

article

Sep 19, 2019

As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability coordinators to maintain a secure supply will be increasingly challenged. This document reviews the v...

Read More

The 1 Overlooked Loophole In Cyber Security THE 1 OVERLOOKED LOOPHOLE IN CYBER SECURITY

video

Sep 18, 2019

There's an often overlooked cyber security loophole that exists for a lot of your clients. Discover how to get paid to close it now.

Read More

Employee Shortages & Skill Gaps In Cybersecurity EMPLOYEE SHORTAGES & SKILL GAPS IN CYBERSECURITY

video

Sep 18, 2019

In the 2nd part with CEO & founder of STASH Secure Data, Janine Darling, we discuss the current shortages of people within the industry and how skill gaps could provide reasoning for this.

Read More

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond HOW AI CAN CHAMPION CYBERSECURITY IN THE INSURANCE INDUSTRY AND BEYOND

article

Sep 18, 2019

Over the last decade, the cybersecurity environment has undergone significant changes. But while the Internet may be vast, it isn’t necessarily becoming safer. Major data leaks from high profile companies like Equifax set a clear message that even big players are vulnerable to security breache...

Read More

Cyber Crisis: Foundations of Multi-Stakeholder Coordination CYBER CRISIS: FOUNDATIONS OF MULTI-STAKEHOLDER COORDINATION

whitepaper

Sep 17, 2019

In this guide, we lay the foundations for multi-stakeholder coordination during cybersecurity crises that can undermine the security of the digital economy. This guide draws on the diverse international perspectives of CSDE members, as well as their leading practices and realworld actions, to increa...

Read More

TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019 TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019

article

Sep 16, 2019

For any successful business, network systems, data, and their storage account for the most valuable digital assets and that is why such assets pose extreme breach threats causing significant business risk. In this digital age, the dependence of business on these increases their potential vulnerabili...

Read More

How Cybersecurity Can Better Support Digital Transformation Business Goals HOW CYBERSECURITY CAN BETTER SUPPORT DIGITAL TRANSFORMATION BUSINESS GOALS

article

Sep 16, 2019

Offering outstanding user experiences and technology interfaces is vital to attracting today’s customers—they demand it. So enterprises leverage ever-growing portfolios of data and systems to differentiate those experiences from their competitors’ offerings, while also strategizing...

Read More

TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020 TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020

article

Sep 16, 2019

As the pace of security breaches keeps on expanding, so does the variety of attacks and the advances and procedures set up to counteract them. However, the top threats in the following couple of years will probably be from a kind of hack known to security experts today. Through 2020, 99% of vulnerab...

Read More

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS

article

Sep 14, 2019

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the servic...

Read More

Cybersecurity considerations for electrical distribution systems CYBERSECURITY CONSIDERATIONS FOR ELECTRICAL DISTRIBUTION SYSTEMS

whitepaper

Sep 12, 2019

Every day, cyber attacks against government and commercial computer networks number in the millions. According to U.S. Cyber Command, Pentagon systems are probed 250,000 times per hour. Similar attacks are becoming more prevalent on other kinds of information-based smart networks as well, such as th...

Read More

The Importance of Cybersecurity Whitepaper - Threat Detection for Utilities THE IMPORTANCE OF CYBERSECURITY WHITEPAPER - THREAT DETECTION FOR UTILITIES

whitepaper

Sep 12, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea...

Read More

5 data privacy and cybersecurity tips for construction firms 5 DATA PRIVACY AND CYBERSECURITY TIPS FOR CONSTRUCTION FIRMS

article

Sep 12, 2019

No industry is immune from data privacy and cybersecurity threats, and that includes the construction industry. Here are five data privacy and cybersecurity tips construction firms should consider putting to use to protect themselves against these looming threats. The best way to protect any organiz...

Read More

DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY

infographic

Sep 12, 2019

597 companies in 33 European countries. 80% of leading European businesses say digital transformation is a current strategic priority for their business. with turnovers from less than €30 million to over €300 million. 78% middle market businesses agree that digital transformation is the on...

Read More

These Howard County cybersecurity companies formed a biz partnership THESE HOWARD COUNTY CYBERSECURITY COMPANIES FORMED A BIZ PARTNERSHIP

article

Sep 11, 2019

Howard County is known for its concentration of cybersecurity companies, and now the proximity is a factor in the formation of a strategic partnership between two of the firms. Through the strategic partnership, Elkridge-based Atlantic Data Forensics (ADF) will use network security tools from Columb...

Read More

Why Companies Are Forming Cybersecurity Alliances WHY COMPANIES ARE FORMING CYBERSECURITY ALLIANCES

article

Sep 11, 2019

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha...

Read More

Cybersecurity: A governance framework for mobile money providers CYBERSECURITY: A GOVERNANCE FRAMEWORK FOR MOBILE MONEY PROVIDERS

whitepaper

Sep 10, 2019

The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with nearly 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent indust...

Read More

Cybersecurity progress this way finally comes CYBERSECURITY PROGRESS THIS WAY FINALLY COMES

article

Sep 09, 2019

Given all the high-profile cybersecurity attacks making headlines these days, it’s easy to conclude that organizations are still not making cybersecurity a high enough priority. However, a survey of 867 senior executives conducted by Infosys representing 847 firms from 12 industries, with annu...

Read More

Malware Attack Prompts School District Closure: K-12 Cyber Disruptions Rising MALWARE ATTACK PROMPTS SCHOOL DISTRICT CLOSURE: K-12 CYBER DISRUPTIONS RISING

article

Sep 09, 2019

The Flagstaff Unified School District in Arizona is just the latest to fall victm to a cybersecurity attack so disruptive it forced schools to close Thursday and Friday of last week. Schools were back in session on Monday, after the district's team worked "round the clock securing systems a...

Read More

SMBs cite security, backup & recovery as top business concerns SMBS CITE SECURITY, BACKUP & RECOVERY AS TOP BUSINESS CONCERNS

article

Sep 09, 2019

Small businesses around the world acknowledge that cybersecurity, backup and data recovery are important aspects of their business, but most of those businesses sit between the two lowest levels of IT maturity. The lack of maturity reflects an ongoing problem that small businesses face – the n...

Read More

4 steps to address the cybersecurity skills shortage 4 STEPS TO ADDRESS THE CYBERSECURITY SKILLS SHORTAGE

article

Sep 09, 2019

University of Waikato’s Cybersecurity Researchers of Waikato (CROW), receives weekly requests from companies to see if personnel or students would be interested in applying for a role or an internship in cybersecurity. The government’s strategy notes that 3,445 cybersecurity incidents we...

Read More

Industrial Cybersecurity: A Proactive Approach Video INDUSTRIAL CYBERSECURITY: A PROACTIVE APPROACH VIDEO

video

Sep 05, 2019

The Industrial Internet of Things is driving a level of increased connectivity that helps companies to improve their overall performance, but also comes with the potential for enterprise risk. With the potential for huge losses at stake, applying cyber security to industrial control systems means ta...

Read More

What will 5G mean for business cybersecurity? WHAT WILL 5G MEAN FOR BUSINESS CYBERSECURITY?

article

Sep 05, 2019

The coming switch to 5G cellular networks will be a boon to businesses in many ways, but it will also create a vast new “attack surface” for hackers. The main attraction to 5G — “lightning-fast” internet speeds — is also what creates the risk. Why? Because it will...

Read More

3 communication skills all cybersecurity pros should have 3 COMMUNICATION SKILLS ALL CYBERSECURITY PROS SHOULD HAVE

video

Sep 04, 2019

Cheryl Kerrigan, Vice President of People at BlueCat, discusses three communication skills that cybersecurity professionals need to be successful. At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers w...

Read More

Why Artificial Intelligence Will Save Cybersecurity? WHY ARTIFICIAL INTELLIGENCE WILL SAVE CYBERSECURITY?

article

Sep 04, 2019

Cybersecurity is in a dire state. Massive breaches are commonplace. A few years ago, 70 million Target customers were affected by a large-scale cyber attack. Target’s CIO was immediately let go in the wake of such an unthinkable disaster. Breaches are affecting more and more citizens. Now 70 m...

Read More

Gartner names Trend Micro leader in endpoint protection platforms GARTNER NAMES TREND MICRO LEADER IN ENDPOINT PROTECTION PLATFORMS

article

Sep 03, 2019

Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend Micro has been named a Leader in every Gartner Magic Quadrant for this categ...

Read More

Two In Three Organizations To Deploy AI In Their Cyber Security System By 2020 TWO IN THREE ORGANIZATIONS TO DEPLOY AI IN THEIR CYBER SECURITY SYSTEM BY 2020

article

Aug 29, 2019

Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, according to Capgemini Research Institute’s Reinventing Cybersecurity with Artificial Intelligence: The New Frontier in Digital Security study. Two thirds (69%) of organization...

Read More

A New Tool For Hackers – AI in Cybersecurity A NEW TOOL FOR HACKERS – AI IN CYBERSECURITY

article

Aug 28, 2019

The dawn of the internet and advances in computing means we’re able to trigger an exact solution to complex problems in diverse areas - ranging from astrophysics and biological systems to automation and precision. But at the same time, these systems are inherently vulnerable to cyber threats. ...

Read More

MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP

infographic

Aug 27, 2019

This IDC Infographic is a snapshot of the results of an Asia/Pacific banking survey to better understand where the cybersecurity gaps and opportunities are for banks to create a more business-focused security strategy. KEY HIGHLIGHTS.

Read More

Can VMware become a leading cybersecurity vendor? CAN VMWARE BECOME A LEADING CYBERSECURITY VENDOR?

article

Aug 27, 2019

When you think about VMware and cybersecurity, two products have always stood out. NSX, which has evolved into a common micro-segmentation tool for east/west traffic within ESXi, and AppDefense, which monitors applications, determines “normal” behavior, and detects anomalies. Now, VMware...

Read More

How AI Is Changing The Cyber-Security Landscape HOW AI IS CHANGING THE CYBER-SECURITY LANDSCAPE

article

Aug 27, 2019

The use of Artificial Intelligence (AI) has enhanced not only the delivery of services but also improved cybersecurity. It’s estimated that 15% of organizations globally have adopted AI technology in their operations. However, the use of technology has both positive and negative consequences f...

Read More

David Spark is the Ira Glass of the Cybersecurity Industry DAVID SPARK IS THE IRA GLASS OF THE CYBERSECURITY INDUSTRY

video

Aug 26, 2019

Take a few minutes with us as our Man on the Street Matt Stephenson checks in with Cybersecurity Media legend David Spark. We catch up on what David has been up to with his podcast series CISO/Vendor Relationship and Defense in Depth.

Read More

Ransomware threat raises National Guard RANSOMWARE THREAT RAISES NATIONAL GUARD'S ROLE IN STATE CYBERSECURITY

article

Aug 26, 2019

National Guard units already play a large role in state governments’ cybersecurity activities, such as protecting election systems, but the threat of ransomware to cripple a state or city organization is a growing concern for uniformed personnel, the top military official overseeing the Nation...

Read More

CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY? CYBERSECURITY AUTOMATION: HOW AUTOMATION TRENDS SOLVE THE COMPLEXITY OF CYBERSECURITY?

article

Aug 26, 2019

As the new-age technologies have disrupted the IT industry, several trending topics grab the attention regularly. The automation of mundane and repetitive tasks has become an essential dose for progressive companies. It releases the workforce from such task and directs them towards more creative wor...

Read More

What Is a Zero-Trust Model in Cybersecurity, and What Does It Mean for Federal IT? WHAT IS A ZERO-TRUST MODEL IN CYBERSECURITY, AND WHAT DOES IT MEAN FOR FEDERAL IT?

article

Aug 23, 2019

Cybersecurity is a perennial concern inside federal agencies, but the conversation is starting to evolve. In the past, perimeter-based IT security defenses were a major area of investment — keeping malicious actors out of networks and away from sensitive data. Increasingly, the cybersecurity l...

Read More

What’s the Difference Between Antivirus and Endpoint Security? WHAT’S THE DIFFERENCE BETWEEN ANTIVIRUS AND ENDPOINT SECURITY?

article

Aug 22, 2019

What’s the difference between antivirus and endpoint security? Why should your enterprise case? How should it affect your enterprise cybersecurity solution decisions? Indeed, the difference between antivirus and endpoint security looks almost indistinguishable from a distance. In fact, antivir...

Read More

Malwarebytes founder and CEO talks the company MALWAREBYTES FOUNDER AND CEO TALKS THE COMPANY'S ORIGIN STORY

video

Aug 22, 2019

Marcin Kleczynski tells the story behind how he and a small band of malware hunters have worked together to build cybersecurity software that can take on the threats traditional antivirus can't handle.

Read More

Why Behavioral Analytics Matter to Enterprise Cybersecurity WHY BEHAVIORAL ANALYTICS MATTER TO ENTERPRISE CYBERSECURITY

article

Aug 22, 2019

Why do behavioral analytics matter so much for your enterprise’s cybersecurity? In fact, what even are behavioral analytics? Which threats can it detect most easily? Why do those threats pose the most danger to your business? Your enterprise network continues to scale as more users connect to ...

Read More

ESET Cybersecurity tips & tricks: UEFI scanning ESET CYBERSECURITY TIPS & TRICKS: UEFI SCANNING

video

Aug 21, 2019

Everyone is familiar with the concept that attackers can launch malicious attacks through email, Windows or other software that runs on our laptops. But can the device itself become the target? Like many other parts of a computer system, UEFI can be attacked to gain unauthorized access to the system...

Read More

CyberRisk Alliance acquires Cybersecurity Collaborative CYBERRISK ALLIANCE ACQUIRES CYBERSECURITY COLLABORATIVE

article

Aug 21, 2019

Cybersecurity and business intelligence company CyberRisk Alliance recently acquired Cybersecurity Collaborative, a peer council platform for Chief Information Security Officers (CISOs). Cybersecurity Collaborative is a private cross-industry forum for CISOs and security professionals devoted to pee...

Read More

Artificial Intelligence: A Tool or a Threat to Cybersecurity? ARTIFICIAL INTELLIGENCE: A TOOL OR A THREAT TO CYBERSECURITY?

article

Aug 21, 2019

Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsic value to both businesses and consumers. Since business operations have become smarter with technology, so ...

Read More

The future of cybersecurity and data THE FUTURE OF CYBERSECURITY AND DATA

video

Aug 20, 2019

Listen to Dr. Charla Griffey-Brown, professor of information systems and technology management at Pepperdine School of Business, talk about cybersecurity. What should leaders be thinking about when looking at their enterprise infrastructure?

Read More

Combating Cybersecurity Challenges with Advanced Analytics COMBATING CYBERSECURITY CHALLENGES WITH ADVANCED ANALYTICS

whitepaper

Aug 19, 2019

Cyber crimes and security threats have grown at an exponential rate in recent years, and the momentum is only growing. According to Juniper Research, over 146 billion records will be exposed through criminal data breaches from 2018 to 2023, growing at a rate of 22.5% per year.1 This builds on the as...

Read More

Simplifying IoT and IoMT Security for Healthcare SIMPLIFYING IOT AND IOMT SECURITY FOR HEALTHCARE

video

Aug 19, 2019

Medigate has integrated their cybersecurity platform with Palo Alto Networks Next Generation Firewalls to improve security of clinical networks and simplify the management of connected medical devices.

Read More

What can we do about public-sector security breaches? WHAT CAN WE DO ABOUT PUBLIC-SECTOR SECURITY BREACHES?

article

Aug 19, 2019

Just as the sun comes up every morning, cybercriminals continually change their tactics to counter the latest defenses. This tactic was highlighted in the annual Verizon Data Breach Investigations Report, which described the changing face of cybersecurity threats. For public-sector organizations, on...

Read More

Why cybersecurity is a central ingredient in evolving digital business models WHY CYBERSECURITY IS A CENTRAL INGREDIENT IN EVOLVING DIGITAL BUSINESS MODELS

article

Aug 19, 2019

About the only thing shifting as fast as the cyber threat landscape is the typical enterprise’s org chart. As enterprises aim to keep pace with the rapidly evolving digital economy, many are restructuring internal departments, hiring criteria and the processes by which they develop and distrib...

Read More

Role of Artificial Intelligence in Data Security ROLE OF ARTIFICIAL INTELLIGENCE IN DATA SECURITY

article

Aug 18, 2019

Just the way the deficiency of vitamin and poor hygiene can make the human body fell seriously ill, the deficient access points and lack of hygiene in cyber environments can lead to cyberattacks in the hyper-connected workplaces. The likelihood of cyberattacks is increasing with continuous balloonin...

Read More

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope BLACK HAT 2019: 3 CYBERSECURITY CONCERNS AND 3 THINGS THAT GIVE HOPE

article

Aug 15, 2019

Organizations worry more about the volume and sophistication of cyber attacks and are confused about what tools to use. It's not all bad news, though, as this year's Black Hat highlighted several security advancements, including greater emphasis on application security and automating securit...

Read More

Detect and Prevent – Responding to cyber attacks - Embracing Technology in FS DETECT AND PREVENT – RESPONDING TO CYBER ATTACKS - EMBRACING TECHNOLOGY IN FS

video

Aug 13, 2019

As technology continues to disrupt the financial services industry, the cybersecurity challenge takes center focus as companies invest in protecting their business and consumers. Our host Tim Broome tackles the matter in-depth with security experts Dave Powell and Mark Leadbetter in our latest Embra...

Read More

Automakers warm up to friendly hackers at cybersecurity conference AUTOMAKERS WARM UP TO FRIENDLY HACKERS AT CYBERSECURITY CONFERENCE

article

Aug 11, 2019

At a conference where hackers can try their hand at picking locks and discover cyber vulnerabilities in a makeshift hospital, they can also endeavor to break into the control units of cars and take over driving functions. Those efforts at the DEF CON security convention in Las Vegas this weekend are...

Read More

Rebuilding Trust After Cybersecurity Lapses REBUILDING TRUST AFTER CYBERSECURITY LAPSES

article

Aug 08, 2019

Trust is a business fundamental, and cybersecurity lapses can rattle the trust of important constituencies. Customers avoid buying from companies they don’t trust. Investors and employees worry about their prospects and livelihoods. Security managers worry about future incidents. Even communit...

Read More

THE IMPORTANCE OF CYBERSECURITY IN 2019 THE IMPORTANCE OF CYBERSECURITY IN 2019

infographic

Aug 08, 2019

Cybersecurity is becoming a big problem for many companies in all industries, as an attack can permanently damage a business or even a person’s life. As the cybersecurity industry continues to grow at a rapid pace, the amount of malware continues to grow each year as well. To highlight the imp...

Read More

The Evolution of Industrial Cybersecurity and Cyber Risk THE EVOLUTION OF INDUSTRIAL CYBERSECURITY AND CYBER RISK

whitepaper

Aug 08, 2019

From Assessment to Automation: Addressing the Cyber Risk Lifecycle in Critical Environments Cybersecurity threats and breaches continue to make headline news with impact across all industries and sectors. The consequences of successful cybersecurity attacks, such as production disruption, product qu...

Read More

How to Detect a Cyber Attack Against Your Company HOW TO DETECT A CYBER ATTACK AGAINST YOUR COMPANY

article

Aug 08, 2019

This article is the third installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.S...

Read More

How to Recover from a Cyber Attack HOW TO RECOVER FROM A CYBER ATTACK

article

Aug 08, 2019

In part four of the MEP National Network five-part series on “Cybersecurity for Manufacturers,” we covered how to respond quickly to an information security breach with a prepared plan of action. Now we’ll explore effective mechanisms for restoring operations after a cybersecurity ...

Read More

ESET cybersecurity tips & tricks: Spear phishing ESET CYBERSECURITY TIPS & TRICKS: SPEAR PHISHING

video

Aug 07, 2019

Spear phishing is a tactic used by cyber criminals whereby they attempt to attack a specific individual as a conduit into the organization. The purpose of the attack is the same as with any phishing email, to gain access to login or confidential information or to deliver malware, but in this instanc...

Read More

State of CyberSecurity Report 2019 STATE OF CYBERSECURITY REPORT 2019

video

Aug 06, 2019

Digital transformations are driving organizations to rethink security threats. The third annual edition of the “State of Cybersecurity Report” from Wipro builds on providing a unique perspective of the building blocks that define the global cybersecurity arena. Download the report here.

Read More

AI for Cybersecurity in Banking – Where Banks Are Investing Today AI FOR CYBERSECURITY IN BANKING – WHERE BANKS ARE INVESTING TODAY

article

Aug 06, 2019

Hackers are cyberattackers are using more sophisticated methods to break into digital networks; they themselves have also started employing artificial intelligence techniques to bypass detection systems. Cyberthreats can compromise enterprise networks at a greater speed than ever before, and cyberse...

Read More

For Cybersecurity, Size Doesn’t Matter FOR CYBERSECURITY, SIZE DOESN’T MATTER

article

Aug 05, 2019

Las Vegas—Small pharmacies, whether focused on specialty, home infusion or other trade channel, should not believe that because of their size, they are not at risk for cyber threats. Organizations without the finances and on-site information technology expertise to ensure the security of their...

Read More

How to Protect Your Business from Cyber Attacks HOW TO PROTECT YOUR BUSINESS FROM CYBER ATTACKS

article

Aug 05, 2019

This article is the second installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U....

Read More

Cybersecurity: the motivation behind cyber-hacks CYBERSECURITY: THE MOTIVATION BEHIND CYBER-HACKS

infographic

Aug 04, 2019

Cyber-attacks are becoming more sophisticated all the time, with cyber hackers coming up with new and determined methods of threat that are increasingly difficult to detect, making attacks more dangerous than ever before. Statistics show that cybercrime is on the rise around the world. It’s es...

Read More

The Three Biggest Hacks Affecting Americans Today THE THREE BIGGEST HACKS AFFECTING AMERICANS TODAY

video

Aug 04, 2019

Americans are reminded almost daily of just how fragile the internet-based financial and commercial infrastructure is. Some data breaches have important political significance. Others represent new trends in cybersecurity and online crimes. Equifax's records were compromised in September 2017, e...

Read More

Cybersecurity for Startups: How to Protect Your Business CYBERSECURITY FOR STARTUPS: HOW TO PROTECT YOUR BUSINESS

article

Aug 01, 2019

Large-scale data breaches, such as the Equifax hack, are ubiquitous nowadays. But if you think that breaches only affect high-profile companies, then you are mistaken. In fact, three out of five small- and medium-sized enterprises (SMEs) have fallen victim to a cyber attack. Many small businesses th...

Read More

Why Complexity Issues Persist in SIEM and Cybersecurity WHY COMPLEXITY ISSUES PERSIST IN SIEM AND CYBERSECURITY

article

Aug 01, 2019

Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They ...

Read More

Inside Viasat’s Cyber Security Operations Center INSIDE VIASAT’S CYBER SECURITY OPERATIONS CENTER

article

Aug 01, 2019

Viasat’s growing CSOC offers cybersecurity to government and private sector customers in the U.S. and beyond. The modern battlespace is all about combined arms. All the various weapons of war – infantry, tanks, artillery, aircraft – must operate in tight coordination, enhancing eac...

Read More

Cybersecurity: Are your passwords stored securely CYBERSECURITY: ARE YOUR PASSWORDS STORED SECURELY

article

Aug 01, 2019

The use of malware designed to harvest consumers’ digital data—known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users, targeted by the stealers, peaked from less than 6,00,000 in the first half of 2018 to over 9,40...

Read More

SMB Cybersecurity Statistics SMB CYBERSECURITY STATISTICS

infographic

Jul 31, 2019

Small and medium sized businesses are facing an increasingly challenging threat landscape. Over the last few years, there has been an increase in the number of breaches, damages from attacks, and threats targeted against their businesses.

Read More

Kaspersky Security for Enterprise KASPERSKY SECURITY FOR ENTERPRISE

whitepaper

Jul 31, 2019

Building a security foundation for your organization by choosing the right product or service is the first step. But developing a forward-thinking corporate cybersecurity strategy is key to long-term success. Kaspersky’s Enterprise Portfolio reflects the security demands of today’s busin...

Read More

6 Challenges In Using Open Source Cybersecurity Tools 6 CHALLENGES IN USING OPEN SOURCE CYBERSECURITY TOOLS

article

Jul 31, 2019

When it comes to cybersecurity, tools and infrastructure matter a lot in order to battle notorious threats. Companies across the world have of late understood the importance of having strong cybersecurity and are trying every possible tool or software to make it better. There are two types of tools ...

Read More

How to Identify Your Company’s Cybersecurity Risks HOW TO IDENTIFY YOUR COMPANY’S CYBERSECURITY RISKS

article

Jul 30, 2019

According to a 2018 IBM-sponsored study by the Ponemon Institute, the global average for a data breach is $3.86 million. That breaks down to almost $150 per stolen record. If you’re a small or medium-sized manufacturer, you may not think statistics like these apply to you. But out of 17 indust...

Read More

What to Consider When Developing a Cybersecurity Strategy WHAT TO CONSIDER WHEN DEVELOPING A CYBERSECURITY STRATEGY

article

Jul 30, 2019

In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach co...

Read More

The Importance of Cyber-Security in Modern Internet Age THE IMPORTANCE OF CYBER-SECURITY IN MODERN INTERNET AGE

article

Jul 30, 2019

Today every person of the globe connects the World Wide Web daily. Even those who do not have accounts on social platforms can be attacked by hackers. How? Nowadays all banks store information about each client in computers and on clouds. It simplifies things and fastens banking service. People like...

Read More

Cybersecurity for Small and Midsize Businesses: A New Opportunity for Service Providers CYBERSECURITY FOR SMALL AND MIDSIZE BUSINESSES: A NEW OPPORTUNITY FOR SERVICE PROVIDERS

whitepaper

Jul 29, 2019

It’s 2019, and small and midsize businesses (SMB) need and want cybersecurity. In a recent survey of 1,000 US small businesses conducted by GoDaddy1 almost 50% of survey respondents reported suffering a financial loss due to hacking, with 13% saying the loss was greater than $5,000. Security i...

Read More

Design competition to create graphics to illustrate cybersecurity stories DESIGN COMPETITION TO CREATE GRAPHICS TO ILLUSTRATE CYBERSECURITY STORIES

article

Jul 29, 2019

Illustrating abstract articles is a pain in the ass, and in the age of social media, a post without an illustration is likely to disappear without attaining any kind of readership, which leaves those of us who cover the field endlessly remixing HAL9000 eyes using walls of code, Matrix text-waterfall...

Read More

5 cybersecurity threats you should be concerned about right nows 5 CYBERSECURITY THREATS YOU SHOULD BE CONCERNED ABOUT RIGHT NOWS

article

Jul 29, 2019

Cybersecurity threats to small- and mid-sized businesses are not only getting more sophisticated, they’re also intensifying. Organizations that would have seen one attack a year are now experiencing them on a weekly or monthly basis. As the threat landscape changes, businesses need to evolve q...

Read More

5G Networks and the Impetus for Cybersecurity Protection at the Gateway 5G NETWORKS AND THE IMPETUS FOR CYBERSECURITY PROTECTION AT THE GATEWAY

article

Jul 29, 2019

5G networks are the talk of the mobile world, with a few test markets already available in the US and the UK. The launch of 5G networks marks a sea change in greater global connectivity and a radical departure from the traditional network connectivity of the past. It also opens up a range of urgent ...

Read More

PENETRATION TESTING AND VULNERABILITY ASSESSMENT FOR NYDFS CYBERSECURITY REGULATIO PENETRATION TESTING AND VULNERABILITY ASSESSMENT FOR NYDFS CYBERSECURITY REGULATIO

infographic

Jul 28, 2019

PENETRATION TESTING AND VULNERABILITY ASSESSMENT FOR NYDFS CYBERSECURITY REGULATION. New York State Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies was promulgated on March 01, 2017 and over the period of next two years, various sections of this r...

Read More

Cybersecurity Firm Drops Code for the Incredibly Dangerous Windows BlueKeep Vulnerability CYBERSECURITY FIRM DROPS CODE FOR THE INCREDIBLY DANGEROUS WINDOWS BLUEKEEP VULNERABILITY

article

Jul 26, 2019

Researchers from U.S. government contractor Immunity have developed a working exploit for the feared Windows bug known as BlueKeep. In May, Microsoft released a patch for a bug in several versions of Windows that is so bad that the company felt it even had to release a fix for Windows XP, an operati...

Read More

How digital technology is transforming cybersecurity in healthcare HOW DIGITAL TECHNOLOGY IS TRANSFORMING CYBERSECURITY IN HEALTHCARE

whitepaper

Jul 25, 2019

In recent years the healthcare industry has undergone a digital revolution. The replacement of paper files with electronic medical records is just one aspect. Many medical procedures and devices now rely on digital technology. While this digital evolution has resulted in significant improvements in ...

Read More

Compliance with Cybersecurity Regulations COMPLIANCE WITH CYBERSECURITY REGULATIONS

video

Jul 25, 2019

A major U.S.-based hotel chain is facing millions of dollars in fines related to General Data Protection Regulation (GDPR). If your company processes or stores any information related to European citizens or customers who were in Europe when they accessed your website, you may be susceptible to fine...

Read More

Personal Medical Devices Recalled For Hacking Risk PERSONAL MEDICAL DEVICES RECALLED FOR HACKING RISK

article

Jul 23, 2019

The US Food and Drug Administration (FDA) has issued a warning to patients and healthcare providers that certain Medtronic MiniMed some insulin pumps carry cybersecurity risks. The alert reads, in part, as follows: "The FDA has become aware than an unauthorized person (someone other than a pati...

Read More

Cybersecurity Controls Assessment CYBERSECURITY CONTROLS ASSESSMENT

whitepaper

Jul 22, 2019

DAS is the state’s central administrative agency. It supports state agencies by providing management frameworks and infrastructure for information systems and services, procurement, and other functions. Responsibility for cybersecurity is split between DAS, the Office of the State CIO, and the...

Read More

Columbia cybersecurity team to compete on national stage COLUMBIA CYBERSECURITY TEAM TO COMPETE ON NATIONAL STAGE

article

Jul 21, 2019

One of the best collegiate Cybersecurity teams in the country is found in Columbia and they are getting ready for a big national competition. Their team, ‘D0wn The L1ne,’ has been practicing for the event at their Columbia Campus of ECPI University. They are headed to Las Vegas to be a p...

Read More

Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void THREAT SPOTLIGHT: SODINOKIBI RANSOMWARE ATTEMPTS TO FILL GANDCRAB VOID

article

Jul 18, 2019

Sodinokibi ransomware, also known as Sodin and REvil, is hardly three months old, yet it has quickly become a topic of discussion among cybersecurity professionals because of its apparent connection with the infamous-but-now-defunct GandCrab ransomware. Detected by Malwarebytes as Ransom.Sodinokibi,...

Read More

How to succeed in the world of cybersecurity HOW TO SUCCEED IN THE WORLD OF CYBERSECURITY

video

Jul 18, 2019

As businesses become increasingly digital, their exposure to cybersecurity threats also increases, meaning that cybersecurity has become an in-demand area of expertise. We spoke to Sean Feeney, a senior cybersecurity software engineer at Fidelity Investments, about the skills you need to work in thi...

Read More

A Traveling Executive A TRAVELING EXECUTIVE'S GUIDE TO CYBERSECURITY

infographic

Jul 17, 2019

Here at Wickr we work with partners everyday helping to ensure the security of their communications. That’s why we’re excited to share this infographic with the help of our friends at OODA Loop. This infographic is a great way to quickly learn how to protect company information and techn...

Read More

The New Why of Cybersecurity THE NEW WHY OF CYBERSECURITY

video

Jul 16, 2019

Digital investment accelerates business velocity, transforms constituent experiences and spawns new opportunities. But this formidable force for human progress also magnifies risk; it accelerates change and complexity, inviting new threats and devastating impacts. Security leaders are left reframing...

Read More

Cybersecurity Tools for CPAs CYBERSECURITY TOOLS FOR CPAS

article

Jul 16, 2019

In a speech at Baruch College’s 18th Annual Financial Reporting Conference, PCAOB member Kathleen Hamm stated: “Technology offers the promise of combining increased efficiencies with improved effectiveness, resulting in enhanced audit quality” (May 2, 2019, http://bit.ly/2HNfgxa). ...

Read More

Artificial Intelligence: A new frontier in cybersecurity ARTIFICIAL INTELLIGENCE: A NEW FRONTIER IN CYBERSECURITY

article

Jul 15, 2019

Security experts opined that more organizations are turning up to Artificial Intelligence (AI) to shore up their security defenses against cybercrimes. Technology firm Capgemini stated that firms find AI as increasingly necessary to bolster cybersecurity. In its research, Reinventing Cybersecurity w...

Read More

Businesses need AI to beef up cybersecurity BUSINESSES NEED AI TO BEEF UP CYBERSECURITY

article

Jul 15, 2019

A lot of businesses are unable to respond quickly to cyberattacks. In many cases they feel simply overwhelmed by the sheer number of data points they need to monitor for intrusion. These were some of the key findings from a new report from the Capgemini Research Institute, but it’s not all doo...

Read More

The primary attack vector: applications THE PRIMARY ATTACK VECTOR: APPLICATIONS

whitepaper

Jul 15, 2019

As cybersecurity threats become more mature, more focused and more dangerous, companies and governments throughout the nation and around the world continue to struggle to provide an acceptable level of protection for their intellectual and physical property and the data they safeguard. How much secu...

Read More

Mitigation Strategies for Cyber Attacks at Your Small Business MITIGATION STRATEGIES FOR CYBER ATTACKS AT YOUR SMALL BUSINESS

article

Jul 15, 2019

If you’re wondering how to protect your small business against a cyber attack, you’re not alone. Almost 60% of cyber attack victims are small businesses, and within two years of the first attack, the likelihood that a small business will experience another is approximately 28%. In respon...

Read More

2019 Forcepoint Cybersecurity Predictions Report 2019 FORCEPOINT CYBERSECURITY PREDICTIONS REPORT

whitepaper

Jul 15, 2019

I nnovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. Take the commute to work, for example, as it offers a glimpse into the relationship between trust and innovation. Everything a person does in that commute to the office is u...

Read More

SailPoint Levels-Up their ABM Strategy with Intent Data SAILPOINT LEVELS-UP THEIR ABM STRATEGY WITH INTENT DATA

article

Jul 15, 2019

The buyer’s journey has changed in a way which leaves many sales and marketing teams struggling to find insight from within what we call the Dark Funnel. However, many technology companies are starting to build solutions to address the radical new way customers engage and buy today by collecti...

Read More

Cybersecurity Skills Are Non-Negotiable for Successful Startups CYBERSECURITY SKILLS ARE NON-NEGOTIABLE FOR SUCCESSFUL STARTUPS

infographic

Jul 14, 2019

It’s a truism that technology is always changing. But what’s important is the way that it’s changing. Right now, we’re moving out of the era where businesses derived their value from the capital that they hold and into one where their data repositories are what matters. Faceb...

Read More

Clemson and other universities work to improve cybersecurity CLEMSON AND OTHER UNIVERSITIES WORK TO IMPROVE CYBERSECURITY

article

Jul 14, 2019

CLEMSON - This spring, a batch of tests were sent to 100 Clemson University faculty and staff emails in an attempt to access private and personal information. A fourth of the emails were blocked by the security system, and several additional recipients alerted the university to the phishing attempt....

Read More

Infosec Skills: The bad guys are getting smarter, are you? INFOSEC SKILLS: THE BAD GUYS ARE GETTING SMARTER, ARE YOU?

video

Jul 11, 2019

As you grow in your cybersecurity career, Infosec Skills is the platform to ensure your skills are scaled to outsmart the latest threats. With courses mapped directly to the NICE Cybersecurity Workforce Framework, you’ll be able to take control of your career, get a step ahead of cybercriminal...

Read More

Cyber Truth or Cyber Myth? CYBER TRUTH OR CYBER MYTH?

article

Jul 10, 2019

As if trying to assemble a successful cybersecurity department were not difficult enough, one of the hardest battles we all find ourselves fighting is the one against well-meaning but often misleading information. Sometimes the information is wrong, but more often it is right … but only when ...

Read More

ESET Cybersecurity Tips & Tricks: Firewalls and how they work ESET CYBERSECURITY TIPS & TRICKS: FIREWALLS AND HOW THEY WORK

video

Jul 10, 2019

The firewall creates a virtual wall around the company's network, acting as a security guard on any traffic that wants to come in, keeping all the internal company assets safe and authorizing.

Read More

A peek into malware analysis tools A PEEK INTO MALWARE ANALYSIS TOOLS

article

Jul 09, 2019

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of...

Read More

Executives’ Changing Views on Cybersecurity EXECUTIVES’ CHANGING VIEWS ON CYBERSECURITY

article

Jul 09, 2019

What does the shift in how cybersecurity is viewed by senior executives within organizations mean? To find out, Radware surveyed more than 260 executives worldwide and discovered that cybersecurity has moved well beyond the domain of the IT department and is now the direct responsibility of senior e...

Read More

The Importance of a Cybersecurity Education | American Military University (AMU) THE IMPORTANCE OF A CYBERSECURITY EDUCATION | AMERICAN MILITARY UNIVERSITY (AMU)

video

Jul 09, 2019

Cybersecurity education is more important today than it has ever been. In this insightful interview, In Cyber Defense Managing Editor Wes O'Donnell speaks with American Public University System's Program Director for Information Systems Security and Information Technology Management Dr. Kevi...

Read More

Senate Bill Would Help Small Businesses Improve Cybersecurity SENATE BILL WOULD HELP SMALL BUSINESSES IMPROVE CYBERSECURITY

article

Jul 09, 2019

Small businesses are more likely to lack resources to build robust cybersecurity capabilities, but Sens. Gary Peters, D-Mich., and Marco Rubio, R-Fla., are looking to address that challenge with their recently introduced Small Business Cybersecurity Assistance Act. The bill would help educate small ...

Read More

Cybersecurity Considerations for IoT Product Design CYBERSECURITY CONSIDERATIONS FOR IOT PRODUCT DESIGN

article

Jul 09, 2019

Mitigating cyber threats is critical to the launch of a successful product. Like technology itself, the Internet of Things (IoT) security is still in its infancy and is evolving rapidly. The legislation is also developing rapidly, with cybersecurity acts in EU and California creating further regulat...

Read More

How to become a cybersecurity consultant HOW TO BECOME A CYBERSECURITY CONSULTANT

video

Jul 08, 2019

John Torres, president of Guidepost Solutions' Security & Technology Practice, talks about potential career paths for cybersecurity consultants in this clip from the Cyber Work podcast.

Read More

Preventing and repairing security breaches PREVENTING AND REPAIRING SECURITY BREACHES

video

Jul 08, 2019

John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations from online and physical threats, and career paths for those looking to pursue a career in cybersecurity.

Read More

Enterprise and Cyber Security ENTERPRISE AND CYBER SECURITY

video

Jul 08, 2019

Strong cybersecurity is critical for trust. But, does new tech mean new threats? Our Director of Cyber Security and Consulting, Haroon Malik, shares more at Fujitsu World Tour.

Read More

8 Cybersecurity Predictions for 2019 8 CYBERSECURITY PREDICTIONS FOR 2019

infographic

Jul 08, 2019

A cyberattack on an automobile will kill someone. We’ve already seen hackers remotely kill a Jeep on the highway, disable safety features like air bags and antilock brakes, and hack into a car’s Bluetooth and OnStar features. As cars become more connected and driverless cars evolve, hack...

Read More

Why quantum computing is a risk to traditional cybersecurity WHY QUANTUM COMPUTING IS A RISK TO TRADITIONAL CYBERSECURITY

video

Jul 08, 2019

Why quantum computing is a risk to traditional cybersecurity. Quantum computing brings new cybersecurity threats. Our CTO for Cybersecurity discusses the importance of crypto-agility and why digital security should be a board level topic.

Read More

6 Healthcare Cybersecurity Tips That Could Save Thousands 6 HEALTHCARE CYBERSECURITY TIPS THAT COULD SAVE THOUSANDS

video

Jul 08, 2019

Chances are you don’t want to spend $50,000 or more in fines for a HIPAA violation, so it’s more critical than ever for you and your healthcare organization to implement the required cybersecurity protocols to ensure you’re protecting sensitive patient data from cybercriminals and ...

Read More

How to Secure Your Mid-Size Organization from the Next Cyber Attack HOW TO SECURE YOUR MID-SIZE ORGANIZATION FROM THE NEXT CYBER ATTACK

article

Jul 08, 2019

Cyber-attacks have become very common these days, and it is carried out on a full-scale. More and more mid-sized organizations are frequently targetted. However, as for the cybersecurity personnel who think that mid-sized organizations are safe, you guys need to think again! By far, the online attac...

Read More

State and Local Agencies Can Boost Cybersecurity with Federal Support STATE AND LOCAL AGENCIES CAN BOOST CYBERSECURITY WITH FEDERAL SUPPORT

article

Jul 08, 2019

Security is not a one-time event: Everyone knows it takes constant monitoring to detect and shore up weaknesses, find and patch vulnerabilities, and stay on top of constantly evolving threats. This requires time, expertise, tools and money — but help is at hand. The U.S. Department of Homeland...

Read More

EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY

article

Jul 08, 2019

The cybersecurity skills shortage is a pressing concern for businesses, with the current shortfall estimated to be around 2 million unfilled positions, a number that is expected to rise to around 3.5 million by 2021. If there’s an upside to this shortage, it is that for those interested in a c...

Read More

Why 5G and AI will determine cybersecurity strategy for the next decade WHY 5G AND AI WILL DETERMINE CYBERSECURITY STRATEGY FOR THE NEXT DECADE

article

Jul 08, 2019

BI.ZONE CEO Dmitry Samartsev and World Economic Forum head of operations William Dixon analysed the most popular technologies and evaluated the cyber risks of tomorrow. Experts talked about the three technologies that are likely to determine the next decade expressed in a joint analytical article. O...

Read More

How secure is your Building Automation System (BAS)? HOW SECURE IS YOUR BUILDING AUTOMATION SYSTEM (BAS)?

infographic

Jul 07, 2019

Building automation systems (BAS) may be as critical as industrial control systems (ICS) in terms of safety and security, yet receive much less attention from the security community. Enhancing BAS cybersecurity programs with device visibility and network monitoring can give organizations a thorough ...

Read More

The Economic Value of DNS Security THE ECONOMIC VALUE OF DNS SECURITY

whitepaper

Jul 07, 2019

New stories of widescale cybersecurity hacks, crimes and vulnerabilities seem to pop up on a daily basis. The constant stream of adverse cyber events has unfortunately caused many small businesses and consumers to live with a dread of inevitability — no matter what they do to protect themselve...

Read More

31 Must-Know Healthcare Cybersecurity Statistics For 2019 31 MUST-KNOW HEALTHCARE CYBERSECURITY STATISTICS FOR 2019

article

Jul 07, 2019

The healthcare industry is a prime target of hackers. The importance of cybersecurity in healthcare is an essential consideration for all organizations handling patient data. Be aware of the latest threats; read our article on the latest Healthcare Cybersecurity Statistics. Cybersecurity Healthcare ...

Read More

The critical shortage of cybersecurity expertise THE CRITICAL SHORTAGE OF CYBERSECURITY EXPERTISE

article

Jul 04, 2019

For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. ...

Read More

How to make sense of Cybersecurity Frameworks HOW TO MAKE SENSE OF CYBERSECURITY FRAMEWORKS

article

Jul 04, 2019

Every time when we have something precious, it is human nature to preserve it from any external damage or threat. Be it the money, jewelry, or properties we ensure everything is safe and intact by practicing due security measures. As a result, sighting security guards is no big deal, as the world ar...

Read More

White Paper: 3 Requirements for Secure Digital Transformation WHITE PAPER: 3 REQUIREMENTS FOR SECURE DIGITAL TRANSFORMATION

whitepaper

Jul 04, 2019

As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnes...

Read More

The Most Telling Cyber Security Statistics in 2019 THE MOST TELLING CYBER SECURITY STATISTICS IN 2019

infographic

Jul 03, 2019

Cybersecurity is often seen as one of those big problems that only large entities like banks, tech companies, and governments have to worry about. In reality, a lot more people should be concerned with cybersecurity and not just the big corporations. The latter may be indeed responsible for more dat...

Read More

The ABC’s of Cybersecurity THE ABC’S OF CYBERSECURITY

video

Jul 03, 2019

Are you ready for the ABC’s and 123’s of Cybersecurity? John Matthew Holt, Founder & CTO of Waratek schools businesses in a great lesson of understanding the basics of protecting your cyber environment. Listen in.

Read More

Cybersecurity: A Nudge in the Right Direction CYBERSECURITY: A NUDGE IN THE RIGHT DIRECTION

infographic

Jul 02, 2019

Knowing the right thing to do doesn’t always translate into doing the right thing. We all know there are speed limits, but we often break them. Traditional cybersecurity awareness programs usually present what to do, why to do it, examples of doing it and so forth, but people frequently still ...

Read More

Sircam: Worm, Virus, Trojan Horse? SIRCAM: WORM, VIRUS, TROJAN HORSE?

article

Jul 02, 2019

At Exabeam, we’re not only interested in developing the newest cybersecurity, we’re also fascinated by what we can learn from older security technologies. Each month the History of Cybersecurity 2019 Calendar features key dates in cybersecurity history, along with a related trivia questi...

Read More

Phishing, cryptocurrency attacks threaten data security – Microsoft PHISHING, CRYPTOCURRENCY ATTACKS THREATEN DATA SECURITY – MICROSOFT

article

Jul 02, 2019

Microsoft has advised government and business organisations to put adequate security in place to prevent cyberattacks through phishing and cryptocurrency in the coming months. Speaking at a cybersecurity roundtable in Lagos, the company said it had observed rising incidents of Enterprise Resource Pl...

Read More

Qatar Issues Aviation Cybersecurity Guidelines QATAR ISSUES AVIATION CYBERSECURITY GUIDELINES

article

Jul 01, 2019

To help avoid disruption of civil aviation operations, the Civil Aviation Authority of Qatar and the Ministry of Communications and Transport have issued cybersecurity guidelines. CAA's new guidelines suggest organizations develop effective risk management, build a structure to respond to breach...

Read More

RISING ATTACKS OF RANSOMWARE 2019 RISING ATTACKS OF RANSOMWARE 2019

infographic

Jul 01, 2019

Rising Attacks of Ransomware 2019. Biggest Ransomware Attacks. Ransomware is a form of malware or a virus that prevents users from accessing their systems or data until a sum of money is paid. Industry Facts in Numbers 50% of 582 surveyed cybersecurity professionals do not believe their organization...

Read More

How Aligned Are Provider Organizations with the Health Industry Cybersecurity Practices (HICP) Guidelines? HOW ALIGNED ARE PROVIDER ORGANIZATIONS WITH THE HEALTH INDUSTRY CYBERSECURITY PRACTICES (HICP) GUIDELINES?

whitepaper

Jul 01, 2019

HICP identifies 10 overarching cybersecurity practices that organizations of all sizes should focus on. For each practice, subpractices based on organization size are also outlined. The 10 overarching cybersecurity practices are: Email Protection Systems. Network Management. Endpoint Protection Syst...

Read More

MULTI-METHOD MODELING AND ANALYSIS OF THE CYBERSECURITY VULNERABILITY MANAGEMENT ECOSYSTEM MULTI-METHOD MODELING AND ANALYSIS OF THE CYBERSECURITY VULNERABILITY MANAGEMENT ECOSYSTEM

whitepaper

Jul 01, 2019

This paper presents modeling and analysis of two critical foundational processes of the cybersecurity vulnerability management ecosystem using a combination of system dynamics and agent-based modeling techniques. The preliminary result from this analysis is that misapplication of either of these fou...

Read More

MULTIFACTOR AUTHENTICATION IS NOT UNHACKABLE MULTIFACTOR AUTHENTICATION IS NOT UNHACKABLE

infographic

Jun 30, 2019

MULTIFACTOR AUTHENTICATION IS NOT UNHACKABLE. There are more than 12 WAYS to bypass MFA 41% of civilian agency user accounts DO NOT use multifactor authentication. 48% of cybersecurity breaches are NOT PREVENTABLE by strong multifactor authentication.

Read More

CYBER SECURITY IN THE FINANCIAL INDUSTRY CYBER SECURITY IN THE FINANCIAL INDUSTRY

infographic

Jun 30, 2019

From complying with industry regulations to meeting evolving customer demands and increasing uptime, institutions within the financial sector each face a unique set of pain points. One challenge they all share is combating the growing cybersecurity threat.

Read More

Cybersecurity Jargon Buster CYBERSECURITY JARGON BUSTER

whitepaper

Jun 30, 2019

An enhanced means of verifying identity that requires you to present two pieces of evidence – your credentials –in order to gain access to an account or other secure/restricted area. Your credentials fall into any of these three categories: something you know (like a password or PIN), so...

Read More

The Impossible Puzzle of Cybersecurity THE IMPOSSIBLE PUZZLE OF CYBERSECURITY

whitepaper

Jun 29, 2019

Results of an independent survey of 3,100 IT managers commissioned by Sophos Cybersecurity just isn’t getting any easier. While protection technologies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. At the same time, the growing complexity of threats m...

Read More

THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL

article

Jun 27, 2019

The word “diversity” has become a buzzword among technical professionals and has been overused many times with little or no meaning to it. Instead of exploiting the word, brands and companies need to prove it. The reality is that cybersecurity lacks diversity, and this article will help ...

Read More

NIST Releases IoT Cyber Security And Privacy Risks Report NIST RELEASES IOT CYBER SECURITY AND PRIVACY RISKS REPORT

article

Jun 27, 2019

There are many enterprises already reaping the benefits of leveraging the Internet of Things (IoT) technology and devices, however as Bain & Company reports, “The IoT could be growing even faster with better cyber security.” In fact, their research shows that customers would pay 22% ...

Read More

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros THE FIVE MOST STARTLING STATISTICS FROM THIS 2019 GLOBAL SURVEY OF 1,200 CYBERSECURITY PROS

infographic

Jun 27, 2019

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edition of the report from the CyberEdge Group was j...

Read More

How to make cybersecurity resonate with employees HOW TO MAKE CYBERSECURITY RESONATE WITH EMPLOYEES

article

Jun 27, 2019

Organisations are facing increased threats from cyber attacks, and employees are often the weakest link in their defence posture. As much as you might hope that common sense would prevail, the reality is that best practices can often go in one ear and out the other. Employees who aren’t proper...

Read More

Drafting an Appropriate Cybersecurity Policy DRAFTING AN APPROPRIATE CYBERSECURITY POLICY

article

Jun 26, 2019

Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent cybersecurity plan, you’re still at risk of being attacked; it’s simply the reality of today’s world. ...

Read More

How to Find the Best Cybersecurity Career Fit HOW TO FIND THE BEST CYBERSECURITY CAREER FIT

infographic

Jun 25, 2019

Cybersecurity is becoming one of the number one concerns for companies and organizations all around the world. With cybercrime at an all-time high, there’s a huge demand for cybersecurity professionals, and with not enough security professionals available, there’s a big gap in the workfo...

Read More

How Machine Learning Within IncMan SOAR Empowers Security Analysts HOW MACHINE LEARNING WITHIN INCMAN SOAR EMPOWERS SECURITY ANALYSTS

article

Jun 25, 2019

In a recent blog post we took a look at the differences between Artificial Intelligence (AI) and Machine Learning (ML) and how today there were being used within the cybersecurity industry to help fight the growing number and sophistication of cyber attacks. Artificial intelligence and machine learn...

Read More

ESET Cybersecurity Tips & Tricks: Types of Malware ESET CYBERSECURITY TIPS & TRICKS: TYPES OF MALWARE

video

Jun 25, 2019

You may often hear experts refer to malware, trojan horses, ransomware, worms, spyware, viruses, etc. What do these terms mean and how does it concern you or your business? Find out in the next episode of ESET Cybersecurity tips & tricks.

Read More

Advancing the Study of Cybersecurity ADVANCING THE STUDY OF CYBERSECURITY

video

Jun 25, 2019

Cedarville University's Center for the Advancement of Cybersecurity is advancing the study of cybersecurity by developing future leaders in the field, shaping cyber education, and promoting cyber awareness in society.

Read More

Angela McKay: The Exponential Growth of Cyber Attacks ANGELA MCKAY: THE EXPONENTIAL GROWTH OF CYBER ATTACKS

video

Jun 25, 2019

Angela McKay is Senior Director of Cybersecurity Policy and Strategy within Customer Security and Trust at Microsoft. In May 2019, she spoke at the Columbia SIPA 2019 Niejelow Rodin Global Digital Futures Policy Forum.

Read More

Calculating your cybersecurity net worth doesn CALCULATING YOUR CYBERSECURITY NET WORTH DOESN'T HAVE TO BE COMPLEX

article

Jun 24, 2019

Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports include financial and non-financial assets as well as all accumulated liabilities in order to determine if the company is profita...

Read More

Current Cybersecurity Market Strong: What’s Driving It? CURRENT CYBERSECURITY MARKET STRONG: WHAT’S DRIVING IT?

article

Jun 24, 2019

Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and networ...

Read More

The week in security: Rethinking security in an age of cyber insecurity THE WEEK IN SECURITY: RETHINKING SECURITY IN AN AGE OF CYBER INSECURITY

article

Jun 24, 2019

It might all have been easier if the Internet had never existed, but the compromise of WhatsApp reflects the ever-changing nature of attacks in today’s cybersecurity threat climate. One approach to hardening vulnerable data has been to use field-level encryption, with MongoDB storing its data ...

Read More

NIST issues new cyber guidelines for contractors NIST ISSUES NEW CYBER GUIDELINES FOR CONTRACTORS

article

Jun 24, 2019

The National Institute of Standards and Technology has issued draft security guidance to help contractors working with high-value assets protect the unclassified (but still sensitive) government data that resides on their networks against advanced persistent threats and other attacks. A draft versio...

Read More

How Artificial Intelligence (AI) Helps Bridge the Cybersecurity Skills Gap HOW ARTIFICIAL INTELLIGENCE (AI) HELPS BRIDGE THE CYBERSECURITY SKILLS GAP

article

Jun 24, 2019

The widespread shortage of skilled security operations and threat intelligence resources in security operations centers (SOCs) leaves many organizations open to the increased risk of a security incident. That’s because they are unable to effectively investigate all discovered, potentially mali...

Read More

5 ways agencies can clean up their cyber hygiene 5 WAYS AGENCIES CAN CLEAN UP THEIR CYBER HYGIENE

article

Jun 24, 2019

Since the concept of cyber hygiene was described by Vinton Cerf in an address to Congress in 2000, government agencies have been cognizant of maintaining a holistic view of their security posture. In fact, in recent years there have been numerous efforts made to improve how agencies maintain their c...

Read More

CYBERSECURITY FOR SMALL BUSINESS CYBERSECURITY FOR SMALL BUSINESS

whitepaper

Jun 23, 2019

CYBERSECURITY BASICS. Cyber criminals target companies of all sizes. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack. Update your software This includes your apps, web browsers, and operating systems. Set update...

Read More

2019 CYBERSECURITY PREDICTIONS 2019 CYBERSECURITY PREDICTIONS

infographic

Jun 23, 2019

2018 was most definitely the year of cybersecurity. We saw an unprecedented number of data breaches, most at a scale which had never been seen before. Of course we also saw the introduction of the highly anticipated General Data Regulation Protection, or GDPR, which caused quite a stir among busines...

Read More

Ransomeware and Other Cyber Security Threats in 2019 w/Tony Pietrocola RANSOMEWARE AND OTHER CYBER SECURITY THREATS IN 2019 W/TONY PIETROCOLA

video

Jun 23, 2019

Tony Pietrocola, Co-Founder of Agile1, a cyber security company focused on the mid-west, has a candid conversation on cybersecurity, blockchain, and the future of data privacy.

Read More

NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS

article

Jun 21, 2019

As technology becomes more deeply embedded into business and society in general, business owners and cybersecurity professionals are facing the task of our generation. That is, securing the global IT infrastructure from those cybercriminals who want to steal data, blackmail big corporations, and tak...

Read More

SANS 2019 State of OT/ICS Cybersecurity Security Survey SANS 2019 STATE OF OT/ICS CYBERSECURITY SECURITY SURVEY

infographic

Jun 21, 2019

People remain the greatest threat to industrial control systems (ICS) and associated networks, according to a SANS survey focused on better understanding cybersecurity risks to operational technology (OT) systems. More than half of respondents also see the cyber risks to their safe and reliable oper...

Read More

Businesses and Charities Experiencing More Cybersecurity Breaches BUSINESSES AND CHARITIES EXPERIENCING MORE CYBERSECURITY BREACHES

article

Jun 21, 2019

Thirty-two percent of businesses and 22 percent of charities are experiencing more cybersecurity attacks, the 2019 Cyber Security Breaches Survey says. The average annual cost for business that lost data or assets after breaches was more than $5,000 and more than $12,000 for charities. Among the 32 ...

Read More

Reinventing Cybersecurity with Artificial Intelligence REINVENTING CYBERSECURITY WITH ARTIFICIAL INTELLIGENCE

whitepaper

Jun 20, 2019

Artificial intelligence (AI) has already been deployed in a multitude of applications to increase productivity, improve sales or enhance experiences. However, one crucial, though often overlooked AI application, is the focus of this report – enhancing protection against cyberattacks. When used...

Read More

Cybersecurity portfolio for business CYBERSECURITY PORTFOLIO FOR BUSINESS

video

Jun 20, 2019

Kaspersky’s Cybersecurity portfolio for business reflects the security demands of today’s businesses, responding to the needs of organizations at different levels of maturity with a step-by-step approach.

Read More

SANS 2019 State of OT/ICS Cybersecurity Survey SANS 2019 STATE OF OT/ICS CYBERSECURITY SURVEY

whitepaper

Jun 19, 2019

The 2019 SANS OT/ICS Cybersecurity Survey explores the challenges involved with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations. This year, SANS focused more broadly on the operational technology (OT...

Read More

Cybersecurity in KONE’s 24/7 connected services CYBERSECURITY IN KONE’S 24/7 CONNECTED SERVICES

video

Jun 19, 2019

KONE secures access to its 24/7 predictive maintenance services with IBM Cloud AppID. Authenticating users and managing user-specific profiles ensures KONE technicians and customers access only the features their role authorizes.

Read More

Cybersecurity, Data Privacy Top Concerns for Enterprises CYBERSECURITY, DATA PRIVACY TOP CONCERNS FOR ENTERPRISES

article

Jun 19, 2019

Cybersecurity and data privacy captured the two top spots in respondents’ list of E&C concerns, according to the 2019 Definitive Corporate Compliance Benchmark Report. Data security and privacy breaches have become a daily worry for most organizations and research shows that most organizat...

Read More

CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY

whitepaper

Jun 18, 2019

NASA’s Jet Propulsion Laboratory (JPL) is a federally funded research and development center in Pasadena, California. Since 1959, the California Institute of Technology (Caltech) has been under contract with NASA to manage JPL, most prominently its research and development activities, but also...

Read More

Who’s responsibility is cybersecurity? WHO’S RESPONSIBILITY IS CYBERSECURITY?

video

Jun 17, 2019

Whose job is it to ensure that users are safe online? From device and IoT manufacturers to cybersecurity companies to users themselves, learn what part each one plays when it comes to upholding the collective responsibility that is cybersecurity.

Read More

Cybersecurity: Raising awareness to prevent attacks CYBERSECURITY: RAISING AWARENESS TO PREVENT ATTACKS

video

Jun 13, 2019

2019 Leadership Exchange: Third-party risk can be costly and time-consuming when best practices aren’t implemented. Supply chain risk, which arises when a third party hires a fourth or a fifth party, escalates the threat of data loss or proprietary resource exposure.

Read More

Entering the Third Decade of Cyber Threats: Toward Greater Clarity in Cyberspace ENTERING THE THIRD DECADE OF CYBER THREATS: TOWARD GREATER CLARITY IN CYBERSPACE

article

Jun 13, 2019

Over the course of just a few decades, the world has entered into a digital age in which powerful evolving cyber capabilities provide access to everyone connected online from any place on the planet. Those capabilities could be harnessed for the benefit of humanity; they might also be abused, leadin...

Read More

Cybersecurity Futures 2025 CYBERSECURITY FUTURES 2025

whitepaper

Jun 12, 2019

Cybersecurity, broadly defined, is the master problem of the Internet era The problem set is evolving more quickly than is our understanding of it (and our ability to ‘solve’) Different countries and industries will grapple with these challenges in different ways Gaining foresight into t...

Read More

EU cybersecurity EU CYBERSECURITY

infographic

Jun 11, 2019

How and why to improve EU cyber security WHY? The EU works to face cyber threats and challenges, but also to grasp opportunities. Opportunities. The transition to a digital single market can bring benefits such as 5G and connectivity: 64 to 75% of Europeans believe that digital technologies have a p...

Read More

Cybersecurity pros think the enemy is winning CYBERSECURITY PROS THINK THE ENEMY IS WINNING

article

Jun 11, 2019

There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a-mouse game is wearing on security professionals, and many feel they are losing in the war against cybercriminals. The first figures are from the Informati...

Read More

3 keys to Powerful Yet Practical Cybersecurity 3 KEYS TO POWERFUL YET PRACTICAL CYBERSECURITY

video

Jun 11, 2019

With signature-based anti-virus catching only 47% of endpoint compromises, and 84% of breaches involving multiple endpoints, it’s clear that “Detection Deficit Disorder” has reached epidemic proportions. The cybersecurity market is certainly not short on over-hyped tools designed t...

Read More

The Importance of a Cybersecurity Strategy for the Business THE IMPORTANCE OF A CYBERSECURITY STRATEGY FOR THE BUSINESS

article

Jun 11, 2019

Research conducted by AV-Test, an independent IT security institute, has revealed that nearly 350,000 new malware programs are created daily. It is unfortunate that some companies still consider malware to be a minor threat, not realizing that something as trivial as a malware-infected email may be ...

Read More

Government No Longer Has to Choose Between Cybersecurity and Productivity GOVERNMENT NO LONGER HAS TO CHOOSE BETWEEN CYBERSECURITY AND PRODUCTIVITY

article

Jun 11, 2019

It’s one of the oldest and trickiest balancing acts that government CIOs face: how to ensure the highest levels of cybersecurity without sacrificing end- user productivity. For years, organizations have struggled to weigh the benefits of adding security controls to combat cyber attacks versus ...

Read More

What to Look for in a Cybersecurity Open Ecosystem WHAT TO LOOK FOR IN A CYBERSECURITY OPEN ECOSYSTEM

whitepaper

Jun 10, 2019

Enterprise IT is growing more complex, with rapid advances in areas ranging from multi-cloud to microservices, from machine learning to containers. One global survey of CIOs reveals that a single mobile or web transaction crosses about 35 different technology systems, up from 22 only five years ago....

Read More

Solving The Cybersecurity Skills Shortage Within Your Organization SOLVING THE CYBERSECURITY SKILLS SHORTAGE WITHIN YOUR ORGANIZATION

infographic

Jun 10, 2019

A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses. But are we prepared to supply these professionals to meet this growing demand? It doesn’t look that way, as 74 percent of responde...

Read More

Vulnerability scanning – in house or third party? VULNERABILITY SCANNING – IN HOUSE OR THIRD PARTY?

article

Jun 10, 2019

You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can h...

Read More

Good enough security isn GOOD ENOUGH SECURITY ISN'T GOOD ENOUGH

article

Jun 10, 2019

Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an ostrich putting its head in the sand or an opossum playing dead to ignore an impending thre...

Read More

Putting Healthcare Security Under the Microscope PUTTING HEALTHCARE SECURITY UNDER THE MICROSCOPE

whitepaper

Jun 09, 2019

Forescout analyzes deployment data to better understand the cybersecurity risks facing healthcare organizations today. The Internet of Medical Things (IoMT) continues to offer exciting possibilities for healthcare organizations to improve patient care. However, this digital transformation and increa...

Read More

Three Cybersecurity Challenges Every Enterprise Needs to Address THREE CYBERSECURITY CHALLENGES EVERY ENTERPRISE NEEDS TO ADDRESS

infographic

Jun 09, 2019

Cybercriminals are becoming increasingly proficient at infiltrating enterprises to steal data for profit, acquire intellectual assets or to simply cause destruction. High profile breaches frequently making the headlines however are just the tip of the iceberg with global losses due to cybercrime pro...

Read More

Binding Link Between Cyber Warfare and IT Security BINDING LINK BETWEEN CYBER WARFARE AND IT SECURITY

article

Jun 09, 2019

Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over th...

Read More

Cybersecurity for End-users: Awareness is a Means, Not a Goal CYBERSECURITY FOR END-USERS: AWARENESS IS A MEANS, NOT A GOAL

article

Jun 09, 2019

Due to the many cyber attacks that have taken place in recent years, organisations and (local) governments are increasingly putting cybersecurity on the agenda as a problem that needs to be tackled. Historically viewed as ‘merely an IT problem’ that can be solved through better programmi...

Read More

BEHIND THE DARK NET BLACK MIRROR THREATS AGAINST THE ENTERPRISE BEHIND THE DARK NET BLACK MIRROR THREATS AGAINST THE ENTERPRISE

whitepaper

Jun 07, 2019

organizations are expected to spend on cybersecurity products and services cumulatively from 2017-20212 . We can do better. Cybercriminals always seem to be a step ahead of enterprise security efforts, and a growing proliferation of dark net platforms is making it easier for them. Only with a thorou...

Read More

18 Cyber-Attacks That Shook The Web 18 CYBER-ATTACKS THAT SHOOK THE WEB

infographic

Jun 06, 2019

With 2019 being MailGuard’s 18th birthday, we’ve rounded up 18 of the biggest and most noteworthy cyber-attacks that shook the web, and changed how we look at cybersecurity. Sony PlayStation 1 Famously known as an ‘identity-the¬ bonanza’, it was reported that an “il...

Read More

Navigating Network Security Complexity NAVIGATING NETWORK SECURITY COMPLEXITY

whitepaper

Jun 06, 2019

In April 2019, the Enterprise Strategy Group (ESG) completed a research survey of 200 cybersecurity, IT, and networking professionals with purchase process responsibility for networking and/or security technologies at their organizations. Further descriptions of the research methodology and survey d...

Read More

Why your employees are a cybersecurity threat WHY YOUR EMPLOYEES ARE A CYBERSECURITY THREAT

article

Jun 06, 2019

In mid-April, Bodybuilding.com announced that its company network had been breached by hackers. This would only be a blip in the endless stream of data breach headlines – security firm Positive Technologies reports that cyberattacks affected billions of people in 2018 – except that it wa...

Read More

6 Bookmark Worthy Cyber Security Blogs You Should Follow Right Away 6 BOOKMARK WORTHY CYBER SECURITY BLOGS YOU SHOULD FOLLOW RIGHT AWAY

article

Jun 06, 2019

Online security and data privacy are two of the hottest topics in the industry at present. And if you are someone who is working in the domain of cyber security or planning to pursue a career in cybersecurity, it is imperative to stay updated with the ongoing trends in the domain. While many people ...

Read More

Cybersecurity Attacks 101: Phishing, Cryptojacking and Ransomware CYBERSECURITY ATTACKS 101: PHISHING, CRYPTOJACKING AND RANSOMWARE

article

Jun 04, 2019

Malware is getting smarter. Cybercriminals now use artificial intelligence and machine learning tools to get better at tricking users into running malicious code and giving away sensitive data. Three client-side attacks have been among the most popular over the past two years and will remain threats...

Read More

Next Generation Cyber Threats: Images NEXT GENERATION CYBER THREATS: IMAGES

article

May 31, 2019

Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization's security and steal their crown jewels - their information. Traditional Data Loss Prevention (DLP) technology provides protecti...

Read More

Executive Guide to the NTT Security 2019 Global Threat Intelligence Report EXECUTIVE GUIDE TO THE NTT SECURITY 2019 GLOBAL THREAT INTELLIGENCE REPORT

infographic

May 30, 2019

Leaders are increasingly savvy about building long-term cybersecurity roadmaps. Maturity is lacking… ambitions outpace preparedness. Cybersecurity is transformed by strategic relationships and the threat landscape continues to evolve. 2018 marked a record year for new vulnerabilities BUT cybe...

Read More

12 Best Cybersecurity Practices in 2019 12 BEST CYBERSECURITY PRACTICES IN 2019

article

May 30, 2019

It’s no exaggeration: any company can fall victim to cyber crime. Reports of cyber attacks come from government organizations, educational and healthcare institutions, banks, law firms, nonprofits, and many other organizations. Hackers, insider threats, ransomware, and other dangers are out th...

Read More

State of Cloud Cybersecurity STATE OF CLOUD CYBERSECURITY

infographic

May 29, 2019

Long-time readers of Healthcare IT Today will know that we love good infographics here at the office. There is nothing better than interesting statistics delivered in a compact, visually appealing format. The Center for Connected Medicine (CCM), based in Pittsburgh and part of UPMC, recently release...

Read More

ITProPortal: CrowdStrike Discusses Life Beyond Malware ITPROPORTAL: CROWDSTRIKE DISCUSSES LIFE BEYOND MALWARE

article

May 28, 2019

The traditional cybersecurity model is an outdated one, focused on building up the perimeter defenses of an organization like some sort of medieval fortress, in an effort to mitigate the threat of incoming malware. However, it is an uncomfortable fact for many that the multi-million-dollar cybersecu...

Read More

Why Cyber Security Is Important For Your Business? WHY CYBER SECURITY IS IMPORTANT FOR YOUR BUSINESS?

article

May 27, 2019

Huge companies have turned much of their attention toward cybersecurity nowadays. As a famous person once said “handling of company data should be your top priority”, we couldn’t agree more with it. Technology is amazing, and technology has made it much easier for us to live our li...

Read More

The technology behind car hacking THE TECHNOLOGY BEHIND CAR HACKING

infographic

May 25, 2019

With the rise of driverless and fully-electronic vehicles, the future of cars is exciting and limitless. Auto manufacturers have made important strides in technology that have improved the safety of our cars. They’ve also made innovative features that lessen the carbon footprint of the transpo...

Read More