CYBERSECURITY: FIVE KEY QUESTIONS THE CEO MUST ASK article Dec 15, 2020 Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity.Every company is a target because they have data and there are too many doors, windows and entryways for cyber attackers to get in, whether on-premise or in the c... Read More |
|
5 DIGITAL TRANSFORMATION-DRIVEN CYBERSECURITY CONSIDERATIONS article Nov 25, 2020 On their road to recovery from the pandemic, businesses face unique dilemmas. This includes substantial and entirely necessary investments in digital transformation, however tight budgets are making such endeavors difficult if not impossible. Businesses continue to struggle with pivots like adopting... Read More |
SASE: A NEXT-GENERATION CLOUD-SECURITY FRAMEWORK article Nov 03, 2020 The ongoing pandemic has forced organizations across the globe to install work-from-home policies. A majority of the workforce in various industries, especially IT, have already adapting to working remotely. With a sudden rise in remote users and growing need and demand for cloud services, a huge vo... Read More |
|
ZERO TRUST – DEMYSTIFIED article Jul 29, 2020 1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions of this depending on which vendor you ask. To help others understand what Zero Trust is, this white paper covers the key aspects of... Read More |
5 WAYS A CISO CAN TACKLE THE CYBERSECURITY SKILLS SHORTAGE NOW whitepaper Jul 18, 2020 Every CISO knows that finding skilled security staff these days is not only hard but getting harder. The number of organizations reporting a cybersecurity skills shortage has risen every year from 42% in 2015 to 53% last year. Estimates suggest this will translate into a shortfall of around 2 millio... Read More |
HOW ORGANIZATIONS CAN PREPARE FOR CYBERSECURITY article Apr 22, 2020 According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technological initiatives like cloud-based applications and workloads that require security beyond the traditional d... Read More |
5 WAYS A CISO CAN TACKLE THE CYBERSECURITY SKILLS SHORTAGE NOW whitepaper Apr 21, 2020 Every CISO knows that finding skilled security staff these days is not only hard but getting harder. The number of organizations reporting a cybersecurity skills shortage has risen every year from 42% in 2015 to 53% last year. Estimates suggest this will translate into a shortfall of around 2 millio... Read More |
A 4 STEP GUIDE TO STRONGER OT CYBERSECURITY article Apr 14, 2020 Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time.... Read More |
WORK FROM HOME: CYBER SECURITY DURING COVID-19 article Apr 14, 2020 COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different ... Read More |
WEBROOT: WIDESPREAD LACK OF CYBERSECURITY BEST PRACTICES article Apr 07, 2020 A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama and Arkansas are the least cyber secure states in the country, while Nebraska, New Hampshire, Wyomin... Read More |
TLS RESEARCH: NORTH-SOUTH AND EAST-WEST WEB TRAFFIC ANALYSIS whitepaper Apr 06, 2020 Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? ... Read More |
TLS RESEARCH: NORTH-SOUTH AND EAST-WEST WEB TRAFFIC ANALYSIS whitepaper Apr 06, 2020 Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? ... Read More |
GUIDE TO FULL NETWORK VISIBILITY AND SSL/TLS DECRYPTION whitepaper Apr 06, 2020 Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. With Gigamon, you can optimize your network operations with full networ... Read More |
GUIDE TO FULL NETWORK VISIBILITY AND SSL/TLS DECRYPTION whitepaper Apr 06, 2020 Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools being used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. With Gigamon, you can optimize your network operations with full networ... Read More |
CYBERSECURITY IN THE TIME OF COVID-19 article Mar 30, 2020 A decade ago, Stuxnet pulled me into the accelerating, widening gyre of cybersecurity. I began to devote less time to global health, a topic on which I spent the previous decade developing familiarity and producing a large carbon footprint. I would frown when cybersecurity analysis borrowed concepts... Read More |
PROGRESS IS THE PROMISE IN NATIONAL CYBERSECURITY STRATEGY article Mar 23, 2020 How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, types of campaigns or operations, lexicon used in national security discourse, and early results of th... Read More |
GUEST BLOG: CYBER SECURITY GUIDANCE FOR REMOTE WORKING article Mar 20, 2020 In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to p... Read More |
|
THE SECRETS OF EVALUATING SECURITY PRODUCTS whitepaper Mar 20, 2020 Cybersecurity technology has become increasingly sophisticated over the last decade. Tools for securing the enterprise are faster and stronger and, as processing speeds have increased, it has become possible to crunch far more data and even apply machine learning to get smart about threat identifica... Read More |
CYBERSECURITY AND CORONAVIRUS: KEEPING YOUR BUSINESS SAFE article Mar 19, 2020 Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybersecurity expert, outlines key challenges and tips for staying secure while away from the office. As... Read More |
CYBERSECURITY MUST BE EMBEDDED IN EVERY ASPECT OF GOVERNMENT TECHNOLOGY article Mar 17, 2020 Cybersecurity has never been more important for every level of our government.The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly advanced cyber skills to exploit both security and the vulnerabilities created by human error. Just last month... Read More |
A COVID-19 CYBERSECURITY POLL: SECURING A REMOTE WORKFORCE article Mar 17, 2020 As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a la... Read More |
CRITICAL GAPS REMAIN IN DEFENSE DEPARTMENT WEAPONS SYSTEM CYBERSECURITY article Mar 13, 2020 While the U.S. military is the most effective fighting force in the modern era, it struggles with the cybersecurity of its most advanced weapons systems. In times of crisis and conflict, it is critical that the United States preserve its ability to defend and surge when adversaries employ cyber capa... Read More |
|
PROTECTING AGAINST CYBERSECURITY THREATS WHEN WORKING FROM HOME article Mar 11, 2020 With the spread of the novel coronavirus (COVID-19), many organizations are requiring or permitting employees to work remotely. This post is intended to remind employers and employees that in the haste to implement widespread work-from-home strategies, data security concerns cannot be forgotten.Empl... Read More |
MALICIOUS CORONAVIRUS MAP HIDES AZORULT INFO-STEALING MALWARE article Mar 11, 2020 Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples, adversaries have created a weaponized coronavirus map app that infects victims with a variant of the information-stealing AZORult malware.The malicious online map, foun... Read More |
RANSOMWARE ATTACK: TOP RANSOMWARE FEBRUARY 2020 video Mar 09, 2020 RANSOMWARE! The dreaded word that is starting to have new DAILY occurrences worldwide. This can happen to YOU! You MUST watch this video to learn how to reduce the risk of getting attacked by ransomware or reducing the severity of it if you do get it . Read More |
SCHNEIDER ELECTRIC ON OPEN AUTOMATION, CYBER SECURITY, & INDUSTRY 4.0 video Mar 06, 2020 Schneider Electric and ARC discuss industrial automation, smart manufacturing, the digital transformation of industries and workforce empowerment. Collaboration, partnerships and open systems are essential for Industry 4.0 enterprises, manufacturers and machine builders to thrive in the digital econ... Read More |
FINDINGS OF CIA HACKING CHINESE INDUSTRIES video Mar 05, 2020 A report out this week shows possible evidence of U.S. cyberattacks on Chinese companies. Findings by Chinese cybersecurity provider Qihoo 360 says a Central Intelligence Agency (CIA) hacking group has been breaking into key Chinese industries for as many as 11 years. The team behind the discovery t... Read More |
CORONAVIRUS AND THE CYBERSECURITY THREAT LANDSCAPE article Mar 04, 2020 Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions from the coronavirus will h... Read More |
|
5G AND IOT SECURITY: WHY CYBERSECURITY EXPERTS ARE SOUNDING AN ALARM article Mar 02, 2020 Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in ho... Read More |
NETWORK TRAFFIC ANALYSIS (NTA): A CYBERSECURITY ‘QUICK WIN’ whitepaper Feb 27, 2020 According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention a... Read More |
WE NEED TO IMPROVE CYBERSECURITY STANDARDS IN SPACE article Feb 27, 2020 Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000 over the next decade. This is part of its ambitious project to provide internet access across t... Read More |
|
SECURITY OPERATIONS MATURITY MODEL whitepaper Feb 20, 2020 As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threa... Read More |
|
SECURITY BY SECTOR: MEDICAL IOT GETS MUCH NEEDED DOSE OF CYBERSECURITY article Feb 20, 2020 The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and r... Read More |
CYBERSECURITY IN RETAIL INFOGRAPHIC infographic Feb 15, 2020 77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. P... Read More |
THE FUTURE OF CYBER: SECURITY AND RESILIENCE video Feb 13, 2020 For more than 30 years, the cybersecurity community has worked to increase the effectiveness of our cybersecurity and resilience efforts. Today we face an explosion of devices, the pervasiveness of software, the threat of adversarial capability, and the dependence of national capabilities on the cyb... Read More |
3 TRENDS IN DATA PRIVACY BREACH LAWS THAT WILL CARRY OVER TO 2020 article Feb 12, 2020 During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move int... Read More |
CYBERSECURITY BEST PRACTICES EVERY ENTERPRISE SHOULD FOLLOW IN 2020 infographic Feb 11, 2020 Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In f... Read More |
FORTINET SECURITY FABRIC ENABLES DIGITAL INNOVATION whitepaper Feb 05, 2020 Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on t... Read More |
ASKOPTIV: DEFENDING AGAINST AI WEAPONIZED THREATS article Feb 05, 2020 2020 is the year for us to seriously consider artificial intelligence (AI) and how it impacts operations, including those involving of threat actors. With all the buzz around the very broad concepts of automation and AI within computer science we should begin by briefly discussing exactly what artif... Read More |
NINE STEPS TO CYBERSECURITY article Feb 05, 2020 There is no need to say that data security is important. Everybody knows that, everybody agrees. On the other hand, knowledge that ‘admin1’ and ‘password1’ are not strong login credentials is also pretty common…but that doesn’t mean they are not still among the m... Read More |
8 ESSENTIAL ELEMENTS OF A COMPREHENSIVE IT SECURITY STRATEGY whitepaper Feb 02, 2020 Data breaches represent a very real threat to businesses and individuals alike. Over 76%1 of IT security breaches in 2018 were motivated by opportunities to gain access to private financial information. That means improved IT security measures should be at the forefront of every business owner’s min... Read More |
RUGGEDCOM CYBERSECURITY SOLUTIONS FOR INDUSTRIAL NETWORKS video Feb 02, 2020 Siemens provides customized cybersecurity solutions that include an integrated portfolio of robust hardware, software and professional services to secure your network. Get the flexibility to safely run Siemens’ own and third party applications from leading cybersecurity companies on the RUGGED... Read More |
MAPPING THE KNOWN UNKNOWNS OF CYBERSECURITY EDUCATION article Feb 02, 2020 Cybersecurity is of increasing importance to societies around the world. This is reflected in national debates, where news stories about breaches, attacks, and policy challenges find their way into the headlines nearly every day. It is also reflected in the curricula of colleges and universities; ma... Read More |
CYBERSECURITY 2018 whitepaper Feb 02, 2020 Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a to... Read More |
THE FUTURE OF CYBERSECURITY IN A DIGITAL WORLD infographic Feb 02, 2020 Data-driven technologies change the way the world works. And the more connected devices flourish, the more cybersecurity matters. There are more digitally connected devices than ever before—and the world is just getting started. Read More |
5G CHOICES: A PIVOTAL MOMENT IN WORLD AFFAIRS article Jan 30, 2020 It is disappointing that the Brits are doing the wrong thing on 5G, having not exhausted other possibilities. Instead they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk that Chinese intelligence services could use Huawei’s a... Read More |
9 TIPS FOR CYBERSECURITY WITH NETWORK SEGMENTATION video Jan 30, 2020 Description There is no security substitute for network segmentation. Locked doors behind locked doors discourage lazy threat actors and force them to look elsewhere. David Landsberger, Telecom Brokerage Inc. director of training and events, teamed up with CompTIA for a video series on security awar... Read More |
IS YOUR CYBERSECURITY FIT FOR THE FUTURE? infographic Jan 28, 2020 A multi-layered approach works together to not only provide EDR capabilities but also to deliver the strong data and cybersecurity that the NHS aspires to. This is proactive cybersecurity protection that is fit for the future. Read More |
TOP 5 CYBERSECURITY THREATS TO THE UK HEALTHCARE SECTOR article Jan 28, 2020 The sheer volume and complexity of data held within the UK healthcare sector makes it a challenge from a cybersecurity perspective to keep secure. In fact, research from a survey we conducted recently revealed that 67% of healthcare organizations in the UK have suffered a cybersecurity incident over... Read More |
CYBERSECURITY WITH CLOUD COMPUTING article Jan 28, 2020 As more organizations adopt cloud computing, it’s imperative they keep cybersecurity front-of-mind. Some analysts project that public cloud spend could increase to $500 billion by 2023, with infrastructure as one of its largest categories — and industry experts have their eye on security... Read More |
CYBER ATTACKS: IT IS NOT A MATTER OF IF BUT WHEN, SAYS NEW ORLEANS’ CIO video Jan 28, 2020 The threat of cyber attacks is growing as cities digitalise their services and use datasets to provide more efficient delivery to citizens. According to the Cisco/Cybersecurity Ventures 2019 Cybersecurity Almanac, governments rank among the most vulnerable sectors for the last five years, alongside ... Read More |
GOING VIRAL: THE CHALLENGES & URGENCY OF MANAGING TPRM whitepaper Jan 24, 2020 Managing cyber risks has become more challenging and urgent as businesses expand their vendor ecosystems.It is difficult enough for organizations to manage their own internal vulnerabilities, but even more challenging to ensure that every vendor across their supply chain has strong security practice... Read More |
ON CYBER SECURITY AND GLOBAL PRIVACY LAWS - ADRIANA SANFORD video Jan 23, 2020 Adriana Sanford is an inspiration around the globe. The award-winning Chilean American cybersecurity and global privacy law expert is an international corporate lawyer, keynote, educator, author, and international television commentator, who appears regularly as a CNN Español analyst to 49 mi... Read More |
|
CYBERSECURITY TRENDS TO KNOW IN 2019 infographic Jan 22, 2020 A neat infographics to quickly understand the new innovations and emerging technologiesthat are helping organisations strengthen their security practices in 2019. With the number of cyber-incidents on the rise, there is a pressing need to be on top of IT security more than ever. In this infographic,... Read More |
CYBERSECURITY & DATA PRIVACY infographic Jan 21, 2020 In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioni... Read More |
CYBER SECURITY EXPOSURES INFOGRAPHIC infographic Jan 16, 2020 It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the c... Read More |
HOW TO PREVENT YOUR BUSINESS BEING HACKED article Jan 16, 2020 During the past two months, I have been approached by four different businesses to help and support them through security breaches that have occurred. In each case, there have been common themes. My concern and frustration arise from the fact that each breach could have easily been prevented by doin... Read More |
|
UNDERSTANDING CANADIAN CYBERSECURITY LAWS: THE FOUNDATIONS article Jan 13, 2020 The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure. Cyberspace is playing an undeniably fundamental role in our day-to-day lives and in business operations around ... Read More |
CYBERSECURITY THREATS CALL FOR A GLOBAL RESPONSE article Jan 13, 2020 Last March, Operation Taiex led to the arrest of the gang leader behind the Carbanak and Cobalt malware attacks on over 100 financial institutions worldwide. This law enforcement operation included the Spanish national police, Europol, FBI, the Romanian, Moldovan, Belarusian, and Taiwanese authoriti... Read More |
EVER WONDERED WHAT IT TAKES TO BECOME A CYBERSECURITY PROFESSIONAL? article Jan 11, 2020 The growth of cybercrime puts businesses and government agencies at the risk of constant threats to their crucial business data, customer data, financial information, and other trade secrets. Cybersecurity professionals play an important role in protecting businesses from cybercriminals. The demand ... Read More |
BUG BOUNTY – ETHICAL HACKING POWERED SECURITY TESTING article Jan 10, 2020 The bug bounty initiative is gaining popularity thanks to the shift in security strategies. It has proven to be a great savior from severe vulnerabilities. If cybercriminals find their way to the bug first, they may exploit it for financial gains. Cybersecurity and Infrastructure Agency (CISA) notic... Read More |
SHAUN STALKER: CYBERSECURITY IN A DYNAMIC EVER-CHANGING WORLD video Jan 10, 2020 Insecurity host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s... Read More |
BEAT BOTNET ATTACKS WITH THESE 8 BRILLIANT TIPS article Jan 09, 2020 Every year, millions of dollars of cryptocurrency are stolen from crypto wallets. After thousands of botnet attacks, cybercriminals are now looking for new ways to make money. To this end, the introduction of cryptocurrency mining botnets came about. It is now sold as a service. Recently, French pol... Read More |
TOP CYBERSECURITY THREATS IN 2020 article Jan 08, 2020 A host of new and evolving cybersecurity threats has the information security industry on high alert. Ever-more sophisticated cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrency and more have placed the data and assets of corporations, governments a... Read More |
HOW HAS THE WORLD OF CYBERSECURITY EVOLVED IN THE LAST DECADE? video Jan 03, 2020 Gearoid Terry, vice-president of enterprise cybersecurity at Fidelity Investments, draws on his wealth of experience in the growing field to give his take on the most pressing cybersecurity threats for enterprises today and the steps organisations need to take to combat them. Read More |
HOSPITALITY COMPANY LANDRY'S INC. IDENTIFIES MALWARE ON PAYMENT SYSTEM article Jan 02, 2020 Landry's, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment and gaming corporation, has reported that it identified malware on its payment processing system. Headquartered in Houston, Texas. Landry's, Inc. owns and operates more than 600 restaurants, hotels, ... Read More |
|
HERE ARE THE TOP CYBERSECURITY PREDICTIONS FOR 2020 article Dec 27, 2019 As 2019 comes to an end, cybersecurity experts are preparing for a new year—and a new decade—and all the cyber scams, breaches, attacks and privacy concerns that threaten consumers and businesses. CyberScout, an industry leader in cyber insurance, data security, and identity theft protec... Read More |
CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT whitepaper Dec 27, 2019 Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems. The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide accurate data... Read More |
CYBERSECURITY BENCHMARKING & SECURITY PERFORMANCE MANAGEMENT whitepaper Dec 27, 2019 Executives and Board members demand to know the answers to these questions, but every cybersecurity professional knows that answering them isn’t as simple as it seems.The available tools for analyzing cybersecurity performance (assessments, audits, software, etc.) don’t always provide ac... Read More |
EXPLORING THE PAST, PRESENT, AND FUTURE OF CYBERSECURITY article Dec 26, 2019 Cyberthreat actors are individuals or groups who work with the malicious intent of taking advantage of vulnerabilities and gaining unauthorized access to information systems. They intend to affect the victim’s data, systems, networks, or devices. The internet is an effective tool that they use... Read More |
DANGERS OF NEW TECH: TOP CYBERSECURITY TRENDS THAT WILL SHAPE 2020 article Dec 26, 2019 As we HEAD into a new decade, there’s no doubt that attackers will try to use innovation against us but determining where they will focus is always a challenge. Here are the top security trends that will impact both businesses and consumers in 2020. Drones open up new pathway for intelligence ... Read More |
HEALTHCARE CYBERSECURITY: REDUCING THE RISK OF DATA BREACHES article Dec 22, 2019 2019 has a bad year for healthcare security breaches. Over 30 million patients in the U.S. have been affected by data breaches so far this year. The majority of attacks have been traced back to third-party vendors and phishing attacks. Furthermore, the industry at large is still dragging its heels o... Read More |
PROMOTING BETTER CYBERSECURITY whitepaper Dec 18, 2019 The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have... Read More |
RANSOMWARE RISK MANAGEMENT: 11 ESSENTIAL STEPS article Dec 18, 2019 There's been a lot of discussion within the InfoSec community about ransomware - why it has been increasing, whether ransoms should be paid and how to mitigate this rapidly growing threat. The culprit that opens the door to these attacks, apparently including last week's city of New Orleans ... Read More |
CYBERSECURITY EXPERTS EXPLAIN THEIR WORK TO CHILDREN video Dec 18, 2019 Everyone occasionally has difficulties communicating, even when talking about the topics you’re expert in, and even explaining them to adults. Explaining cybersecurity concepts to children adds layers of complexity, but it’s important to understand the risks behind ignorance. Read More |
DECADE RETROSPECTIVE: CYBERSECURITY FROM 2010 TO 2019 article Dec 18, 2019 Yes, technically, decades begin in years that end in one, but it's easier to say the 2010s than the 2011s. Prior to 2010, cybersecurity was an insular domain. No one really cared, until something they were using didn't work. Devices blew up due to malware or adware, and users got annoyed whe... Read More |
|
CLOSING A CRITICAL GAP IN CYBERSECURITY article Dec 16, 2019 Last year, faced with rising threats in cyberspace, Congress established the nation’s first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). We serve as the nation’s risk adviser, which means we’re the agency responsible for working w... Read More |
THE ROLE OF AI IN CYBERSECURITY article Dec 13, 2019 Emerging technologies put cybersecurity at risk. Even the new advancements in defensive strategies of security professionals fail at some point. Besides, as offensive-defensive strategies and innovations are running in a never-ending cycle, the complexity and volume of cyberattacks have increased. C... Read More |
CYBERSECURITY WHITEPAPER 2018 whitepaper Dec 12, 2019 Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats ... Read More |
|
|
HOW TO TEST EMPLOYEE CYBER COMPETENCE THROUGH PEN-TESTING article Dec 11, 2019 Take the Nigerian 419 scam as an example – the scammer tries to convince the victim to help get supposedly ill-gotten cash out of their own country into a safe bank, offering a percentage of the money for their participation. While “Nigerian prince” emails have been scamming people... Read More |
|
CYBERSECURITY AND AI IN TODAY’S WORLD article Dec 10, 2019 In an always advancing cyber threat landscape where antivirus programming and firewalls are viewed as tools of antiquity, companies are currently searching for all the more technologically advanced methods for protecting classified and sensitive data. Artificial intelligence (AI) is accepting the si... Read More |
|
A LIFELINE: PATIENT SAFETY AND CYBERSECURITY whitepaper Dec 03, 2019 Healthcare information is unique and personal to us all.Indeed,the patient is at the center of healthcare, as it would not exist if the patient did not exist. Bits and bytes in today’s digital world have real significance when it come to patient care lives are on the line. Read More |
A STRONG CYBERSECURITY STRATEGY FOR DEVICE MANUFACTURERS video Dec 03, 2019 The Thales Trusted Key Manager delivers the industry’s most advanced encryption tools and provides a security interface that interactes with a variety of IoT platforms through APIs. A unique platform to manage the security of large fleets of devices from various manufacturers. Read More |
HOW AI IS TRANSFORMING THE CYBERSECURITY LANDSCAPE GABRIEL TREMBLAY video Dec 02, 2019 In this episode of Devo Talks, our guest Gabriel Tremblay shares some insight on how his company, Delve Labs is using artificial intelligence to tackle cybersecurity. Before Gabriel was CEO of Delve Labs, he had the opportunity to help organize and start NorthSec, the largest cybersecurity conferenc... Read More |
61% OF MALICIOUS ADS TARGET WINDOWS USERS article Dec 02, 2019 Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon. The company said that based on data gathered by its internal tools, 61% of the malicious ads they've observed from between July 11 and November 22, 2019 were ... Read More |
WHAT DOES IMDRF'S NEW CYBERSECURITY GUIDANCE MEAN FOR YOU? article Dec 02, 2019 In the age of connectivity, cybersecurity has become critical to all stakeholders in the medical device field. Different federal agencies in the United States (U.S.), as well as agencies across the globe, have begun to address this issue through regulatory guidance and enforcement action. The U.S. h... Read More |
CYBER SECURITY WHAT MAKES A STRONG PASSWORD infographic Dec 01, 2019 The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password. Read More |
WARRING STATE - CHINA'S CYBERSECURITY STRATEGY whitepaper Dec 01, 2019 Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generat... Read More |
DELTAV SIS™ AND CYBERSECURITY whitepaper Nov 28, 2019 Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for... Read More |
|
GUARDSIGHT - NIST CYBERSECURITY FRAMEWORK video Nov 26, 2019 GuardSight is a cybersecurity consulting firm and an established provider of specialized cybersecurity services. Our cybersecurity protection packages, automation, and data science techniques compliment our elite and reliable cybersecurity experts. Read More |
THE IMPORTANCE OF CYBERSECURITY THREAT DETECTION FOR UTILITIES whitepaper Nov 25, 2019 Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are crea... Read More |
|
|
THINK AUBURN: CYBERSECURITY video Nov 20, 2019 Auburn University and the Samuel Ginn College of Engineering are taking the lead as an institution on the forefront of cybersecurity research and professional preparedness in the industry. Read More |
CYBERSECURITY: WE ARE ALL STAKEHOLDERS video Nov 20, 2019 According to Scott Jamar, VP of Industry Relations, the best approach to security is to view all networks as potential risks. When it comes to cybersecurity, we all have roles to play. Read More |
SKEYE - CYBERSECURITY FOR MEDICAL DEVICES video Nov 19, 2019 Skeye is a vendor-agnostic cybersecurity solution for networked medical devices that leverages medical device expertise, artificial intelligence, systematic processes, and security professionals to help keep your medical devices resilient in the face of cybersecurity risk. Read More |
ALEX STAMOS: CREATING A THOROUGH CYBER DEFENSE SYSTEM video Nov 19, 2019 Alex Stamos is the former Chief of Security at Facebook & an adjunct Professor at Stanford. Stamos is a cybersecurity expert, business leader and entrepreneur whose career has focused on improving the security and safety of the Internet. In this video, Stamos talks about the US's offensive a... Read More |
2019 WITNESSED 5 OF THE BIGGEST CYBERSECURITY TRENDS article Nov 19, 2019 Even when different organizations and businesses have varying needs that depend on cybersecurity solutions, IT security remains to be a consistent problem among organizations. This article covers the most prominent cybersecurity trends of this year, including frequently emerging types of attacks, a ... Read More |
SMART CITIES AND CYBERSECURITY: THE ESSENTIALS article Nov 19, 2019 With the growing popularity of IoT and digitization, smart cities have become a reality. Harnessing the power of data, design thinking, and digital technologies, smart cities are the sure future of urban lifestyle. However, as with other digital transformations, smart cities bring with them a barrag... Read More |
VA CONTINUES TO STRUGGLE WITH INFORMATION SECURITY, WATCHDOGS SAY article Nov 15, 2019 Two watchdog agencies told lawmakers Thursday that the Veterans Affairs Department continues to struggle with cybersecurity issues, despite recent improvements. Audits have identified numerous information security vulnerabilities—and insufficient attempts to remedy them—at the VA, leader... Read More |
MEASURING ORGANIZATION’S CYBERSECURITY article Nov 15, 2019 No individual or company is sheltered from the reach of cybercriminals. Corporate data breaches are more typical than any time ever, and notwithstanding progresses in security programming, hackers keep on getting increasingly sophisticated and hard to identify.As an entrepreneur, cybersecurity ought... Read More |
|
|
CYBER SECURITY: DEFENDING YOUR DIGITAL BUSINESS whitepaper Nov 13, 2019 Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, busin... Read More |
ENTERPRISES NEED TO FOCUS ON CYBERSECURITY STRATEGIES AROUND 5G article Nov 13, 2019 Companies need to implement technologies like virtualization and automation to protect themselves from cyber threats that 5G will bring. AT&T has prepared the report after surveying 704 security practitioners from North America, Australia, and the UK, to know how prepared enterprises are for the... Read More |
TIPS FOR STAYING SAFE ONLINE article Nov 12, 2019 Almost one-fifth of organisations in Ireland have reported at least one technology-related security incident in the last 12 months. According to the Central Statistics Office (CSO), these attacks can have significant consequences, with 5% reporting that it resulted in the destruction or corruption o... Read More |
|
AT&T CYBERSECURITY INSIGHTS™ REPORT: SECURITY AT THE SPEED OF 5G article Nov 11, 2019 While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model. This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in ... Read More |
HOW WE CAN MAKE AMERICANS SAFER ONLINE article Nov 11, 2019 Since the first National Cybersecurity Awareness Month 15 years ago, the world has gone from about 800 million internet users to approximately 4.5 billion users. Over that same period of time, a lot of time and energy has been devoted to improving cybersecurity and cyber hygiene. Sadly, despite thos... Read More |
COUNCILS LACK RESOURCES TO MANAGE CYBER THREATS article Nov 11, 2019 Local Government Professionals Australia has made a submission to the federal government’s 2020 Cyber Security Strategy identifying ways it can support local government. A report surveying local government CEOs and general managers, JLT Public Sector Risk Report 2019, by risk consultancy JLT i... Read More |
GBM SECURITY WHITEPAPER whitepaper Nov 10, 2019 We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation ... Read More |
CYBERSECURITY AND CYBER RESILIENCE PERCEPTION GAPS video Nov 10, 2019 Protecting IT against cyber threats is a strategic priority for businesses. But as IT ecosystems grow beyond the four walls of your organization, there may be a number of grey areas on security and resilience responsibilities. Read More |
MASTER OF SCIENCE IN CYBERSECURITY LAW video Nov 08, 2019 Markus Rauschecker, Director of the Cybersecurity Program at Maryland Carey Law's Center for Health and Homeland Security discusses the Master of Science in Law program. Read More |
|
PROTECT THE BUSINESS FROM EDGE TO AI WITH CLOUDERA CYBERSECURITY article Nov 07, 2019 Gartner estimates 30x connected device growth by 2020. Faster 5G networks bringing an explosion of inexpensive, connected devices. This enables new and more innovative applications and capabilities to improve customer experience. However, all these new applications and connections also broaden the n... Read More |
10 TIPS TO STEER CLEAR FROM DAILY CYBERCRIME article Nov 06, 2019 When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year. Being cautious while tending to financial transactions won’t ensure that you are cyber safe. ... Read More |
IOT CYBERSECURITY VISION 2018-2019 whitepaper Nov 06, 2019 The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by s... Read More |
THIS WEBSITE HAS SOLVED CYBERSECURITY article Nov 06, 2019 Big companies that hold our personal data get hacked almost every day, but most don’t really know how to deal with getting hacked, especially when it comes to telling users what happened. If you’ve read some data breach disclosures or notices, you know the classic “we take your pri... Read More |
GET OUT! THE FUD IS COMING FROM THE INSIDE article Nov 05, 2019 On LinkedIn, Ron C. of CoreSolutions Software said, “Cybersecurity is no longer just a technical problem. It’s now more of a people problem! So why aren’t businesses prioritizing security awareness training for their staff?” There was a massive response and mixed agreement. R... Read More |
|
HEALTHCARE CYBERATTACKS RAISE QUESTIONS ABOUT CYBERSECURITY TRAINING article Nov 04, 2019 A recent search showed the Office for Civil Rights was investigating 548 such breaches in the last 24 months. These included health information breaches at hospitals, cancer centers, hospice facilities, group practices and more.Perhaps as concerning as the rate at which these healthcare cyberattacks... Read More |
A SECURITY FAILURE IN THE WHITE HOUSE article Nov 01, 2019 At the time, ODNI predicted similar Russian efforts in the future. That prediction has come to pass: The FBI has reported Russian efforts against the 2020 elections. Nor are they the only ones taking aim at U.S. elections. Facebook recently found evidence of Iranian operations against the Trump camp... Read More |
|
MIMECAST: TACKLING CYBERSECURITY IN A CONNECTED ECONOMY article Oct 31, 2019 Mimecast, founded in 2003, is an international cyber resilience company, with offices in the UK, US, South Africa, Australia, Europe and the Middle East. Mimecast uses dispersed data centers, intelligent mail routing and robust cloud security to provide a security network capable of managing over 35... Read More |
TIPS TO PROTECT IT: NATIONAL CYBERSECURITY AWARENESS MONTH video Oct 30, 2019 Held every October, National Cybersecurity Awareness Month is a collaborative effort between the government and the industry to raise awareness about the importance of cybersecurity and to provide the resources we need to be safer and more secure online. In our short video series, we'll be givin... Read More |
INSIDER THREATS: A PROBLEM THAT IS PREVENTABLE article Oct 30, 2019 Earlier this summer, I read a fascinating story about McAfee launching a lawsuit against three former employees. The lawsuit alleged that these employees conspired to steal trade secrets on behalf of their new employer, accusing them of moving to a competitor and exfiltrating business-sensitive docu... Read More |
SAY IT LOUD! I DIDN’T READ THE PRIVACY POLICY AND I’M PROUD! article Oct 29, 2019 We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. W... Read More |
2019 TOP THREE PRIVACY TRENDS IN US LAWMAKING article Oct 29, 2019 The original version of this blog, excluding NICE references, was initially published in Lydia de la Torre's Medium Blog. The version below has been extensively edited. The original version can be accessible here. The year 2019 began with a significant increase in bill introductions at the State... Read More |
WHAT DO HURRICANES AND CYBERSECURITY HAVE IN COMMON? article Oct 29, 2019 With hurricanes intensifying, it’s not hard to imagine this scenario: it’s early October and the Weather Channel is extensively covering a hurricane that’s going to hit the East Coast of the United States in five days. Right now, it’s just a tropical storm somewhere near Cuba... Read More |
THE FUTURE OF AI IN CYBERSECURITY article Oct 29, 2019 The buzzword for 2019 that we have all heard a thousand times is Artificial Intelligence, AI. This term has been placed on products ranging from smartwatches to washing machines and of course every security tool on the market. Advertisements lead us to believe that if you couldn’t find a way t... Read More |
2020 CYBER SECURITY TRENDS YOU SHOULD BE AWARE OF article Oct 28, 2019 Cybersecurity is a fast-evolving game of wits where hackers and defenders continue to outmanoeuvre one another. Staying up to date with the latest trends in cybersecurity is not only beneficial; it’s imperative for everyone involved. Large-scale data breaches always make it to the headlines &n... Read More |
WILL AI DRIVEN CYBER SECURITY HELP STOP MALICIOUS ATTACKS? article Oct 24, 2019 In this era of modern technology, cyber-attacks occur in many cases and are predominant than ever before. Artificial Intelligence in cyber security has been helping IT professionals to predict and block the cyber-attacks more effectively. AI has shaken the cybersecurity industry with its astonishing... Read More |
|
|
CYBERSECURITY: A CRUCIAL ISSUE FOR INDUSTRY AND TRANSPORT STAKEHOLDERS article Oct 21, 2019 Cybersecurity is defined as all the technical and non-technical measures of protection that enable an information system to withstand events liable to compromise the availability, integrity, confidentiality or associated proofs (identity, authenticity, traceability) of data stored, processed or tran... Read More |
|
|
US DOD COMMENTS ON HUAWEI, HIKVISION, DAHUA CYBER SECURITY CONCERNS video Oct 16, 2019 Can you talk a little bit about the Department of Defense's concerns about cybersecurity as it relates to the PRC? Last year in the NDAA there was a ban for Huawei, Hikvision, and Dahua. So is the Department of Defense concerned about companies and organizations that might have influence by the ... Read More |
WHAT IS CYBERSECURITY? article Oct 13, 2019 Cybersecurity, or computer security, is the protection of computer systems from the theft or damage to their hardware, software, of electric data, as well as form the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance to computer s... Read More |
CYBER REPORT: WHAT IS CYBER SECURITY? video Oct 12, 2019 October is National Cyber Security Awareness Month and on this first episode of the Cyber Report, sponsored by Northrop Grumman Cyber & Intelligence Mission Solutions, Matt Jorgenson talks to Defense & Aerospace Report Editor Vago Muradian about what cyber security is and why it matters. Read More |
THE C-SUITE AND CYBERSECURITY video Oct 11, 2019 Attendees at this year’s WSJ Pro Cybersecurity Executive Summit in London gathered to discuss hot-button issues for cybersecurity. This video looks at how the responsibilities of the C-suite have evolved in response to the increasing importance of cybersecurity. Read More |
|
MCALEENAN SPEAKS AT CYBERSECURITY EVENT video Oct 10, 2019 FOX News operates the FOX News Channel (FNC), FOX Business Network (FBN), FOX News Radio, FOX News Headlines 24/7, FOXNews.com and the direct-to-consumer streaming service, FOX Nation. FOX News also produces FOX News Sunday on FOX Broadcasting Company and FOX News Edge. Read More |
CYBERSECURITY FOR FINANCIAL INSTITUTIONS video Oct 09, 2019 As a bank or financial institution, you work with sensitive data every day. You likely have extensive files with account information, FEIN numbers, financial reports, and more. If you get hacked, each and every one of your customers could be affected. This is an easy way to lose the trust you’... Read More |
|
HOW CLOUD COMPUTING IS CHANGING CYBERSECURITY article Oct 07, 2019 As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do amazing things with web-delivered technologies. However, one of the biggest issues around the cloud has always been, and still is, cybersecurity. (Read The Truth About Cybersecurity.)The clou... Read More |
WHAT EVERY CEO NEEDS TO KNOW ABOUT CYBERSECURITY video Oct 05, 2019 Mathew Moynahan, CEO of Forcepoint explains what every CEO needs to know about cybersecurity. According to him, external protection isn't enough and it is paramount to empower teams to fight threats. EMIR is the Middle East's most influential corporate intelligence network for CEOs and gover... Read More |
ZTE CYBERSECURITY WHITE PAPER whitepaper Oct 04, 2019 The 5G era has been started. Technologies like cloud computing, the Internet of Things (IoT), big data, and AI are gradually booming in the market. These new technologies bring about a new industry revolution together with significant cybersecurity concerns. Read More |
|
NINTH ANNUAL COST OF CYBERCRIME STUDY infographic Oct 02, 2019 The Ninth Annual Cost of Cybercrime study combines research across 11 countries in 16 industries. We interviewed 2,647 senior leaders from 355 companies and drew on the experience and expertise of Accenture Security to examine the economic impact of cyberattacks. Read More |
31 DAYS OF ONLINE SECURITY TIPS infographic Oct 02, 2019 We’ve written a few articles recently about cybersecurity because we feel this area is often neglected by otherwise security-conscious individuals. Even if you’re not a tech expert who spends most of the day working with computers, the internet has become an inseparable part of our daily... Read More |
BUILD YOUR CAREER WITH OUR CYBERSECURITY AND TECHNOLOGY RISK TEAM video Oct 02, 2019 Are you searching for a career in Cybersecurity? GE Aviation is hiring! Our Cybersecurity and Technology Risk team is actively searching for talent to add to our growing team and help protect GE Aviation’s critical assets. Watch here as Senior Executive of Risk & Compliance, Deneen DeFiore... Read More |
BENEFITS OF USING A MANAGED SERVICES PROVIDER FOR CYBERSECURITY video Oct 02, 2019 When you talk to business leaders and owners of all sizes there appears to be one key business concern and challenge cybersecurity and compliance. Threats are arising inside and outside a company’s network, across all industries, making businesses more aware of their exposure to hacking attemp... Read More |
CYBER SECURITY AWARENESS MONTH STARTS TODAY article Oct 01, 2019 For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year Halloween. However, it’s time not only to prepare for all things spooky. Far from it October is also a month dedicated to a subject that, if ig... Read More |
|
|
DIGITAL TRANSFORMATION AND CYBERSECURITY (RGB) infographic Sep 29, 2019 As companies embrace technologies such as the Internet of Things, big data, cloud, and mobility, security must be more than an afterthought. But in the digital era, the focus needs to shift from securing network perimeters to safeguarding data spread across systems, devices, and the cloud. Read More |
|
|
WAIT… WHAT? GOOD NEWS IN CYBERSECURITY? article Sep 24, 2019 We simply don’t hear enough good news cybersecurity stories that make those involved proud. What are the cybersecurity stories that aren’t being told publicly that should be? Michael Farnum, Set Solutions, said, “If you come into the job and aren’t willing to critically revie... Read More |
THE GOOD FOR TEXAS CYBERSECURITY TOUR: ANDREW RODRIGUEZ video Sep 24, 2019 Student Andrew Rodriguez describes how closely the cybersecurity program at UTSA has aligned with his experience as an intern at our agency. See how higher education programs in Texas are responding to the need for a cybersecurity workforce in Texas. Read More |
ENCRYPTION BACKDOORS WHAT IT MEANS FOR MACHINES AND CYBERSECURITY video Sep 24, 2019 The biggest debate in cybersecurity today - should governments implement encryption backdoors? Venafi's CEO Jeff Hudson explains what this would mean for the security of some of our safest tech - from self-driving cars to nuclear reactors, and all machines that are on the internet. Venafi - inve... Read More |
THE CYBER RISK TO FOOD PROCESSING AND MANUFACTURING whitepaper Sep 20, 2019 Almost every week brings news of a new cybersecurity incident. These typically effect companiesand organizations in the financial, retail, or healthcare industries or, more recently, state and localgovernments. They also usually involve data breaches or other attacks that affect informationtechnolog... Read More |
THE CYBERSECURITY BLUEPRINT whitepaper Sep 20, 2019 Cybercrime has grown costlier over the past few years. Ponemon Institute found the average cost of a data breach for businesses was $3.86 million USD per incident1 . Security incidents also affect a large portion of businesses. A study from Thales Security found 70% of their respondents in the Unite... Read More |
PREPARING FOR PHYSICAL AND CYBERSECURITY CONVERGENCE article Sep 20, 2019 In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private se... Read More |
10 STEPS TO CYBERSECURITY, AS DEFINED BY GCHQ article Sep 19, 2019 GCHQ, the Government Communications Headquarters is an intelligence and security agency responsible for keeping the U.K. safe. The team of GCHQ uses cutting-edge technology, technical ingenuity, and wide-ranging partnerships to identify, analyze, and disrupt threats. GCHQ deals with real threats tha... Read More |
5 TIPS AND TRICKS TO BOOST SMALL BUSINESS SECURITY article Sep 19, 2019 Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Many small business owners think they're safe from hackers. After all, wh... Read More |
5 TIPS & TRICKS THAT BOOST SMALL BUSINESS SECURITY article Sep 19, 2019 Keep your small business safe from hackers using these cybersecurity tips. Small businesses often fall into the trap of lax security, both online and in person. However, it's essential for small business owners to consider how they can navigate the world of digital security risks and dangers. Ma... Read More |
CYBERSECURITY FOR DISTRIBUTED ENERGY RESOURCES AND SCADA SYSTEMS article Sep 19, 2019 As the U.S. bulk power system continues to focus on distributed energy resources (DERs) for more of our overall electricity needs, the ability of the grid operators, power marketers, and reliability coordinators to maintain a secure supply will be increasingly challenged. This document reviews the v... Read More |
|
|
HOW AI CAN CHAMPION CYBERSECURITY IN THE INSURANCE INDUSTRY AND BEYOND article Sep 18, 2019 Over the last decade, the cybersecurity environment has undergone significant changes. But while the Internet may be vast, it isn’t necessarily becoming safer. Major data leaks from high profile companies like Equifax set a clear message that even big players are vulnerable to security breache... Read More |
CYBER CRISIS: FOUNDATIONS OF MULTI-STAKEHOLDER COORDINATION whitepaper Sep 17, 2019 In this guide, we lay the foundations for multi-stakeholder coordination during cybersecurity crises that can undermine the security of the digital economy. This guide draws on the diverse international perspectives of CSDE members, as well as their leading practices and realworld actions, to increa... Read More |
TOP 10 CYBERSECURITY MERGERS AND ACQUISITION OF 2019 article Sep 16, 2019 For any successful business, network systems, data, and their storage account for the most valuable digital assets and that is why such assets pose extreme breach threats causing significant business risk. In this digital age, the dependence of business on these increases their potential vulnerabili... Read More |
|
TOP 10 CYBER SECURITY TRENDS TO WATCH IN 2020 article Sep 16, 2019 As the pace of security breaches keeps on expanding, so does the variety of attacks and the advances and procedures set up to counteract them. However, the top threats in the following couple of years will probably be from a kind of hack known to security experts today. Through 2020, 99% of vulnerab... Read More |
|
CYBERSECURITY CONSIDERATIONS FOR ELECTRICAL DISTRIBUTION SYSTEMS whitepaper Sep 12, 2019 Every day, cyber attacks against government and commercial computer networks number in the millions. According to U.S. Cyber Command, Pentagon systems are probed 250,000 times per hour. Similar attacks are becoming more prevalent on other kinds of information-based smart networks as well, such as th... Read More |
|
5 DATA PRIVACY AND CYBERSECURITY TIPS FOR CONSTRUCTION FIRMS article Sep 12, 2019 No industry is immune from data privacy and cybersecurity threats, and that includes the construction industry. Here are five data privacy and cybersecurity tips construction firms should consider putting to use to protect themselves against these looming threats. The best way to protect any organiz... Read More |
DIGITAL TRANSFORMATION AND ITS IMPACT ON CYBERSECURITY infographic Sep 12, 2019 597 companies in 33 European countries. 80% of leading European businesses say digital transformation is a current strategic priority for their business. with turnovers from less than €30 million to over €300 million. 78% middle market businesses agree that digital transformation is the on... Read More |
THESE HOWARD COUNTY CYBERSECURITY COMPANIES FORMED A BIZ PARTNERSHIP article Sep 11, 2019 Howard County is known for its concentration of cybersecurity companies, and now the proximity is a factor in the formation of a strategic partnership between two of the firms. Through the strategic partnership, Elkridge-based Atlantic Data Forensics (ADF) will use network security tools from Columb... Read More |
WHY COMPANIES ARE FORMING CYBERSECURITY ALLIANCES article Sep 11, 2019 In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more time increasing their offensive capabilities tha... Read More |
CYBERSECURITY: A GOVERNANCE FRAMEWORK FOR MOBILE MONEY PROVIDERS whitepaper Sep 10, 2019 The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with nearly 400 companies in the broader mobile ecosystem, including handset and device makers, software companies, equipment providers and internet companies, as well as organisations in adjacent indust... Read More |
CYBERSECURITY PROGRESS THIS WAY FINALLY COMES article Sep 09, 2019 Given all the high-profile cybersecurity attacks making headlines these days, it’s easy to conclude that organizations are still not making cybersecurity a high enough priority. However, a survey of 867 senior executives conducted by Infosys representing 847 firms from 12 industries, with annu... Read More |
|
SMBS CITE SECURITY, BACKUP & RECOVERY AS TOP BUSINESS CONCERNS article Sep 09, 2019 Small businesses around the world acknowledge that cybersecurity, backup and data recovery are important aspects of their business, but most of those businesses sit between the two lowest levels of IT maturity. The lack of maturity reflects an ongoing problem that small businesses face – the n... Read More |
4 STEPS TO ADDRESS THE CYBERSECURITY SKILLS SHORTAGE article Sep 09, 2019 University of Waikato’s Cybersecurity Researchers of Waikato (CROW), receives weekly requests from companies to see if personnel or students would be interested in applying for a role or an internship in cybersecurity. The government’s strategy notes that 3,445 cybersecurity incidents we... Read More |
INDUSTRIAL CYBERSECURITY: A PROACTIVE APPROACH VIDEO video Sep 05, 2019 The Industrial Internet of Things is driving a level of increased connectivity that helps companies to improve their overall performance, but also comes with the potential for enterprise risk. With the potential for huge losses at stake, applying cyber security to industrial control systems means ta... Read More |
WHAT WILL 5G MEAN FOR BUSINESS CYBERSECURITY? article Sep 05, 2019 The coming switch to 5G cellular networks will be a boon to businesses in many ways, but it will also create a vast new “attack surface” for hackers. The main attraction to 5G — “lightning-fast” internet speeds — is also what creates the risk. Why? Because it will... Read More |
3 COMMUNICATION SKILLS ALL CYBERSECURITY PROS SHOULD HAVE video Sep 04, 2019 Cheryl Kerrigan, Vice President of People at BlueCat, discusses three communication skills that cybersecurity professionals need to be successful. At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers w... Read More |
WHY ARTIFICIAL INTELLIGENCE WILL SAVE CYBERSECURITY? article Sep 04, 2019 Cybersecurity is in a dire state. Massive breaches are commonplace. A few years ago, 70 million Target customers were affected by a large-scale cyber attack. Target’s CIO was immediately let go in the wake of such an unthinkable disaster. Breaches are affecting more and more citizens. Now 70 m... Read More |
GARTNER NAMES TREND MICRO LEADER IN ENDPOINT PROTECTION PLATFORMS article Sep 03, 2019 Cybersecurity solutions provider Trend Micro announced that it has been named a Leader in Gartner’s 2019 Magic Quadrant for Endpoint Protection Platforms in evaluation of its Apex One endpoint security solution. Trend Micro has been named a Leader in every Gartner Magic Quadrant for this categ... Read More |
|
A NEW TOOL FOR HACKERS – AI IN CYBERSECURITY article Aug 28, 2019 The dawn of the internet and advances in computing means we’re able to trigger an exact solution to complex problems in diverse areas - ranging from astrophysics and biological systems to automation and precision. But at the same time, these systems are inherently vulnerable to cyber threats. ... Read More |
MIND THE CYBERSECURITY AND BANKING OPPORTUNITY GAP infographic Aug 27, 2019 This IDC Infographic is a snapshot of the results of an Asia/Pacific banking survey to better understand where the cybersecurity gaps and opportunities are for banks to create a more business-focused security strategy. KEY HIGHLIGHTS. Read More |
CAN VMWARE BECOME A LEADING CYBERSECURITY VENDOR? article Aug 27, 2019 When you think about VMware and cybersecurity, two products have always stood out. NSX, which has evolved into a common micro-segmentation tool for east/west traffic within ESXi, and AppDefense, which monitors applications, determines “normal” behavior, and detects anomalies. Now, VMware... Read More |
HOW AI IS CHANGING THE CYBER-SECURITY LANDSCAPE article Aug 27, 2019 The use of Artificial Intelligence (AI) has enhanced not only the delivery of services but also improved cybersecurity. It’s estimated that 15% of organizations globally have adopted AI technology in their operations. However, the use of technology has both positive and negative consequences f... Read More |
|
RANSOMWARE THREAT RAISES NATIONAL GUARD'S ROLE IN STATE CYBERSECURITY article Aug 26, 2019 National Guard units already play a large role in state governments’ cybersecurity activities, such as protecting election systems, but the threat of ransomware to cripple a state or city organization is a growing concern for uniformed personnel, the top military official overseeing the Nation... Read More |
|
|
WHAT’S THE DIFFERENCE BETWEEN ANTIVIRUS AND ENDPOINT SECURITY? article Aug 22, 2019 What’s the difference between antivirus and endpoint security? Why should your enterprise case? How should it affect your enterprise cybersecurity solution decisions? Indeed, the difference between antivirus and endpoint security looks almost indistinguishable from a distance. In fact, antivir... Read More |
|
WHY BEHAVIORAL ANALYTICS MATTER TO ENTERPRISE CYBERSECURITY article Aug 22, 2019 Why do behavioral analytics matter so much for your enterprise’s cybersecurity? In fact, what even are behavioral analytics? Which threats can it detect most easily? Why do those threats pose the most danger to your business? Your enterprise network continues to scale as more users connect to ... Read More |
ESET CYBERSECURITY TIPS & TRICKS: UEFI SCANNING video Aug 21, 2019 Everyone is familiar with the concept that attackers can launch malicious attacks through email, Windows or other software that runs on our laptops. But can the device itself become the target? Like many other parts of a computer system, UEFI can be attacked to gain unauthorized access to the system... Read More |
CYBERRISK ALLIANCE ACQUIRES CYBERSECURITY COLLABORATIVE article Aug 21, 2019 Cybersecurity and business intelligence company CyberRisk Alliance recently acquired Cybersecurity Collaborative, a peer council platform for Chief Information Security Officers (CISOs). Cybersecurity Collaborative is a private cross-industry forum for CISOs and security professionals devoted to pee... Read More |
ARTIFICIAL INTELLIGENCE: A TOOL OR A THREAT TO CYBERSECURITY? article Aug 21, 2019 Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsic value to both businesses and consumers. Since business operations have become smarter with technology, so ... Read More |
THE FUTURE OF CYBERSECURITY AND DATA video Aug 20, 2019 Listen to Dr. Charla Griffey-Brown, professor of information systems and technology management at Pepperdine School of Business, talk about cybersecurity. What should leaders be thinking about when looking at their enterprise infrastructure? Read More |
COMBATING CYBERSECURITY CHALLENGES WITH ADVANCED ANALYTICS whitepaper Aug 19, 2019 Cyber crimes and security threats have grown at an exponential rate in recent years, and the momentum is only growing. According to Juniper Research, over 146 billion records will be exposed through criminal data breaches from 2018 to 2023, growing at a rate of 22.5% per year.1 This builds on the as... Read More |
|
WHAT CAN WE DO ABOUT PUBLIC-SECTOR SECURITY BREACHES? article Aug 19, 2019 Just as the sun comes up every morning, cybercriminals continually change their tactics to counter the latest defenses. This tactic was highlighted in the annual Verizon Data Breach Investigations Report, which described the changing face of cybersecurity threats. For public-sector organizations, on... Read More |
|
ROLE OF ARTIFICIAL INTELLIGENCE IN DATA SECURITY article Aug 18, 2019 Just the way the deficiency of vitamin and poor hygiene can make the human body fell seriously ill, the deficient access points and lack of hygiene in cyber environments can lead to cyberattacks in the hyper-connected workplaces. The likelihood of cyberattacks is increasing with continuous balloonin... Read More |
BLACK HAT 2019: 3 CYBERSECURITY CONCERNS AND 3 THINGS THAT GIVE HOPE article Aug 15, 2019 Organizations worry more about the volume and sophistication of cyber attacks and are confused about what tools to use. It's not all bad news, though, as this year's Black Hat highlighted several security advancements, including greater emphasis on application security and automating securit... Read More |
|
AUTOMAKERS WARM UP TO FRIENDLY HACKERS AT CYBERSECURITY CONFERENCE article Aug 11, 2019 At a conference where hackers can try their hand at picking locks and discover cyber vulnerabilities in a makeshift hospital, they can also endeavor to break into the control units of cars and take over driving functions. Those efforts at the DEF CON security convention in Las Vegas this weekend are... Read More |
REBUILDING TRUST AFTER CYBERSECURITY LAPSES article Aug 08, 2019 Trust is a business fundamental, and cybersecurity lapses can rattle the trust of important constituencies. Customers avoid buying from companies they don’t trust. Investors and employees worry about their prospects and livelihoods. Security managers worry about future incidents. Even communit... Read More |
THE IMPORTANCE OF CYBERSECURITY IN 2019 infographic Aug 08, 2019 Cybersecurity is becoming a big problem for many companies in all industries, as an attack can permanently damage a business or even a person’s life. As the cybersecurity industry continues to grow at a rapid pace, the amount of malware continues to grow each year as well. To highlight the imp... Read More |
THE EVOLUTION OF INDUSTRIAL CYBERSECURITY AND CYBER RISK whitepaper Aug 08, 2019 From Assessment to Automation: Addressing the Cyber Risk Lifecycle in Critical Environments Cybersecurity threats and breaches continue to make headline news with impact across all industries and sectors. The consequences of successful cybersecurity attacks, such as production disruption, product qu... Read More |
HOW TO DETECT A CYBER ATTACK AGAINST YOUR COMPANY article Aug 08, 2019 This article is the third installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.S... Read More |
HOW TO RECOVER FROM A CYBER ATTACK article Aug 08, 2019 In part four of the MEP National Network five-part series on “Cybersecurity for Manufacturers,” we covered how to respond quickly to an information security breach with a prepared plan of action. Now we’ll explore effective mechanisms for restoring operations after a cybersecurity ... Read More |
ESET CYBERSECURITY TIPS & TRICKS: SPEAR PHISHING video Aug 07, 2019 Spear phishing is a tactic used by cyber criminals whereby they attempt to attack a specific individual as a conduit into the organization. The purpose of the attack is the same as with any phishing email, to gain access to login or confidential information or to deliver malware, but in this instanc... Read More |
STATE OF CYBERSECURITY REPORT 2019 video Aug 06, 2019 Digital transformations are driving organizations to rethink security threats. The third annual edition of the “State of Cybersecurity Report” from Wipro builds on providing a unique perspective of the building blocks that define the global cybersecurity arena. Download the report here. Read More |
AI FOR CYBERSECURITY IN BANKING – WHERE BANKS ARE INVESTING TODAY article Aug 06, 2019 Hackers are cyberattackers are using more sophisticated methods to break into digital networks; they themselves have also started employing artificial intelligence techniques to bypass detection systems. Cyberthreats can compromise enterprise networks at a greater speed than ever before, and cyberse... Read More |
FOR CYBERSECURITY, SIZE DOESN’T MATTER article Aug 05, 2019 Las Vegas—Small pharmacies, whether focused on specialty, home infusion or other trade channel, should not believe that because of their size, they are not at risk for cyber threats. Organizations without the finances and on-site information technology expertise to ensure the security of their... Read More |
HOW TO PROTECT YOUR BUSINESS FROM CYBER ATTACKS article Aug 05, 2019 This article is the second installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.... Read More |
CYBERSECURITY: THE MOTIVATION BEHIND CYBER-HACKS infographic Aug 04, 2019 Cyber-attacks are becoming more sophisticated all the time, with cyber hackers coming up with new and determined methods of threat that are increasingly difficult to detect, making attacks more dangerous than ever before. Statistics show that cybercrime is on the rise around the world. It’s es... Read More |
THE THREE BIGGEST HACKS AFFECTING AMERICANS TODAY video Aug 04, 2019 Americans are reminded almost daily of just how fragile the internet-based financial and commercial infrastructure is. Some data breaches have important political significance. Others represent new trends in cybersecurity and online crimes. Equifax's records were compromised in September 2017, e... Read More |
CYBERSECURITY FOR STARTUPS: HOW TO PROTECT YOUR BUSINESS article Aug 01, 2019 Large-scale data breaches, such as the Equifax hack, are ubiquitous nowadays. But if you think that breaches only affect high-profile companies, then you are mistaken. In fact, three out of five small- and medium-sized enterprises (SMEs) have fallen victim to a cyber attack. Many small businesses th... Read More |
WHY COMPLEXITY ISSUES PERSIST IN SIEM AND CYBERSECURITY article Aug 01, 2019 Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They ... Read More |
INSIDE VIASAT’S CYBER SECURITY OPERATIONS CENTER article Aug 01, 2019 Viasat’s growing CSOC offers cybersecurity to government and private sector customers in the U.S. and beyond. The modern battlespace is all about combined arms. All the various weapons of war – infantry, tanks, artillery, aircraft – must operate in tight coordination, enhancing eac... Read More |
CYBERSECURITY: ARE YOUR PASSWORDS STORED SECURELY article Aug 01, 2019 The use of malware designed to harvest consumers’ digital data—known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users, targeted by the stealers, peaked from less than 6,00,000 in the first half of 2018 to over 9,40... Read More |
SMB CYBERSECURITY STATISTICS infographic Jul 31, 2019 Small and medium sized businesses are facing an increasingly challenging threat landscape. Over the last few years, there has been an increase in the number of breaches, damages from attacks, and threats targeted against their businesses. Read More |
KASPERSKY SECURITY FOR ENTERPRISE whitepaper Jul 31, 2019 Building a security foundation for your organization by choosing the right product or service is the first step. But developing a forward-thinking corporate cybersecurity strategy is key to long-term success. Kaspersky’s Enterprise Portfolio reflects the security demands of today’s busin... Read More |
6 CHALLENGES IN USING OPEN SOURCE CYBERSECURITY TOOLS article Jul 31, 2019 When it comes to cybersecurity, tools and infrastructure matter a lot in order to battle notorious threats. Companies across the world have of late understood the importance of having strong cybersecurity and are trying every possible tool or software to make it better. There are two types of tools ... Read More |
HOW TO IDENTIFY YOUR COMPANY’S CYBERSECURITY RISKS article Jul 30, 2019 According to a 2018 IBM-sponsored study by the Ponemon Institute, the global average for a data breach is $3.86 million. That breaks down to almost $150 per stolen record. If you’re a small or medium-sized manufacturer, you may not think statistics like these apply to you. But out of 17 indust... Read More |
WHAT TO CONSIDER WHEN DEVELOPING A CYBERSECURITY STRATEGY article Jul 30, 2019 In a world where devices of all types are connected to networks, the need to maintain strong cybersecurity is greater than ever. For organizations, particularly those that retain financial and other sensitive company and customer data, cybersecurity is critical, as the results of a network breach co... Read More |
THE IMPORTANCE OF CYBER-SECURITY IN MODERN INTERNET AGE article Jul 30, 2019 Today every person of the globe connects the World Wide Web daily. Even those who do not have accounts on social platforms can be attacked by hackers. How? Nowadays all banks store information about each client in computers and on clouds. It simplifies things and fastens banking service. People like... Read More |
|
|
5 CYBERSECURITY THREATS YOU SHOULD BE CONCERNED ABOUT RIGHT NOWS article Jul 29, 2019 Cybersecurity threats to small- and mid-sized businesses are not only getting more sophisticated, they’re also intensifying. Organizations that would have seen one attack a year are now experiencing them on a weekly or monthly basis. As the threat landscape changes, businesses need to evolve q... Read More |
5G NETWORKS AND THE IMPETUS FOR CYBERSECURITY PROTECTION AT THE GATEWAY article Jul 29, 2019 5G networks are the talk of the mobile world, with a few test markets already available in the US and the UK. The launch of 5G networks marks a sea change in greater global connectivity and a radical departure from the traditional network connectivity of the past. It also opens up a range of urgent ... Read More |
|
|
HOW DIGITAL TECHNOLOGY IS TRANSFORMING CYBERSECURITY IN HEALTHCARE whitepaper Jul 25, 2019 In recent years the healthcare industry has undergone a digital revolution. The replacement of paper files with electronic medical records is just one aspect. Many medical procedures and devices now rely on digital technology. While this digital evolution has resulted in significant improvements in ... Read More |
COMPLIANCE WITH CYBERSECURITY REGULATIONS video Jul 25, 2019 A major U.S.-based hotel chain is facing millions of dollars in fines related to General Data Protection Regulation (GDPR). If your company processes or stores any information related to European citizens or customers who were in Europe when they accessed your website, you may be susceptible to fine... Read More |
PERSONAL MEDICAL DEVICES RECALLED FOR HACKING RISK article Jul 23, 2019 The US Food and Drug Administration (FDA) has issued a warning to patients and healthcare providers that certain Medtronic MiniMed some insulin pumps carry cybersecurity risks. The alert reads, in part, as follows: "The FDA has become aware than an unauthorized person (someone other than a pati... Read More |
CYBERSECURITY CONTROLS ASSESSMENT whitepaper Jul 22, 2019 DAS is the state’s central administrative agency. It supports state agencies by providing management frameworks and infrastructure for information systems and services, procurement, and other functions. Responsibility for cybersecurity is split between DAS, the Office of the State CIO, and the... Read More |
COLUMBIA CYBERSECURITY TEAM TO COMPETE ON NATIONAL STAGE article Jul 21, 2019 One of the best collegiate Cybersecurity teams in the country is found in Columbia and they are getting ready for a big national competition. Their team, ‘D0wn The L1ne,’ has been practicing for the event at their Columbia Campus of ECPI University. They are headed to Las Vegas to be a p... Read More |
THREAT SPOTLIGHT: SODINOKIBI RANSOMWARE ATTEMPTS TO FILL GANDCRAB VOID article Jul 18, 2019 Sodinokibi ransomware, also known as Sodin and REvil, is hardly three months old, yet it has quickly become a topic of discussion among cybersecurity professionals because of its apparent connection with the infamous-but-now-defunct GandCrab ransomware. Detected by Malwarebytes as Ransom.Sodinokibi,... Read More |
HOW TO SUCCEED IN THE WORLD OF CYBERSECURITY video Jul 18, 2019 As businesses become increasingly digital, their exposure to cybersecurity threats also increases, meaning that cybersecurity has become an in-demand area of expertise. We spoke to Sean Feeney, a senior cybersecurity software engineer at Fidelity Investments, about the skills you need to work in thi... Read More |
A TRAVELING EXECUTIVE'S GUIDE TO CYBERSECURITY infographic Jul 17, 2019 Here at Wickr we work with partners everyday helping to ensure the security of their communications. That’s why we’re excited to share this infographic with the help of our friends at OODA Loop. This infographic is a great way to quickly learn how to protect company information and techn... Read More |
THE NEW WHY OF CYBERSECURITY video Jul 16, 2019 Digital investment accelerates business velocity, transforms constituent experiences and spawns new opportunities. But this formidable force for human progress also magnifies risk; it accelerates change and complexity, inviting new threats and devastating impacts. Security leaders are left reframing... Read More |
CYBERSECURITY TOOLS FOR CPAS article Jul 16, 2019 In a speech at Baruch College’s 18th Annual Financial Reporting Conference, PCAOB member Kathleen Hamm stated: “Technology offers the promise of combining increased efficiencies with improved effectiveness, resulting in enhanced audit quality” (May 2, 2019, http://bit.ly/2HNfgxa). ... Read More |
ARTIFICIAL INTELLIGENCE: A NEW FRONTIER IN CYBERSECURITY article Jul 15, 2019 Security experts opined that more organizations are turning up to Artificial Intelligence (AI) to shore up their security defenses against cybercrimes. Technology firm Capgemini stated that firms find AI as increasingly necessary to bolster cybersecurity. In its research, Reinventing Cybersecurity w... Read More |
BUSINESSES NEED AI TO BEEF UP CYBERSECURITY article Jul 15, 2019 A lot of businesses are unable to respond quickly to cyberattacks. In many cases they feel simply overwhelmed by the sheer number of data points they need to monitor for intrusion. These were some of the key findings from a new report from the Capgemini Research Institute, but it’s not all doo... Read More |
THE PRIMARY ATTACK VECTOR: APPLICATIONS whitepaper Jul 15, 2019 As cybersecurity threats become more mature, more focused and more dangerous, companies and governments throughout the nation and around the world continue to struggle to provide an acceptable level of protection for their intellectual and physical property and the data they safeguard. How much secu... Read More |
MITIGATION STRATEGIES FOR CYBER ATTACKS AT YOUR SMALL BUSINESS article Jul 15, 2019 If you’re wondering how to protect your small business against a cyber attack, you’re not alone. Almost 60% of cyber attack victims are small businesses, and within two years of the first attack, the likelihood that a small business will experience another is approximately 28%. In respon... Read More |
2019 FORCEPOINT CYBERSECURITY PREDICTIONS REPORT whitepaper Jul 15, 2019 I nnovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. Take the commute to work, for example, as it offers a glimpse into the relationship between trust and innovation. Everything a person does in that commute to the office is u... Read More |
SAILPOINT LEVELS-UP THEIR ABM STRATEGY WITH INTENT DATA article Jul 15, 2019 The buyer’s journey has changed in a way which leaves many sales and marketing teams struggling to find insight from within what we call the Dark Funnel. However, many technology companies are starting to build solutions to address the radical new way customers engage and buy today by collecti... Read More |
CYBERSECURITY SKILLS ARE NON-NEGOTIABLE FOR SUCCESSFUL STARTUPS infographic Jul 14, 2019 It’s a truism that technology is always changing. But what’s important is the way that it’s changing. Right now, we’re moving out of the era where businesses derived their value from the capital that they hold and into one where their data repositories are what matters. Faceb... Read More |
CLEMSON AND OTHER UNIVERSITIES WORK TO IMPROVE CYBERSECURITY article Jul 14, 2019 CLEMSON - This spring, a batch of tests were sent to 100 Clemson University faculty and staff emails in an attempt to access private and personal information. A fourth of the emails were blocked by the security system, and several additional recipients alerted the university to the phishing attempt.... Read More |
INFOSEC SKILLS: THE BAD GUYS ARE GETTING SMARTER, ARE YOU? video Jul 11, 2019 As you grow in your cybersecurity career, Infosec Skills is the platform to ensure your skills are scaled to outsmart the latest threats. With courses mapped directly to the NICE Cybersecurity Workforce Framework, you’ll be able to take control of your career, get a step ahead of cybercriminal... Read More |
CYBER TRUTH OR CYBER MYTH? article Jul 10, 2019 As if trying to assemble a successful cybersecurity department were not difficult enough, one of the hardest battles we all find ourselves fighting is the one against well-meaning but often misleading information. Sometimes the information is wrong, but more often it is right … but only when ... Read More |
|
A PEEK INTO MALWARE ANALYSIS TOOLS article Jul 09, 2019 So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of... Read More |
EXECUTIVES’ CHANGING VIEWS ON CYBERSECURITY article Jul 09, 2019 What does the shift in how cybersecurity is viewed by senior executives within organizations mean? To find out, Radware surveyed more than 260 executives worldwide and discovered that cybersecurity has moved well beyond the domain of the IT department and is now the direct responsibility of senior e... Read More |
|
SENATE BILL WOULD HELP SMALL BUSINESSES IMPROVE CYBERSECURITY article Jul 09, 2019 Small businesses are more likely to lack resources to build robust cybersecurity capabilities, but Sens. Gary Peters, D-Mich., and Marco Rubio, R-Fla., are looking to address that challenge with their recently introduced Small Business Cybersecurity Assistance Act. The bill would help educate small ... Read More |
CYBERSECURITY CONSIDERATIONS FOR IOT PRODUCT DESIGN article Jul 09, 2019 Mitigating cyber threats is critical to the launch of a successful product. Like technology itself, the Internet of Things (IoT) security is still in its infancy and is evolving rapidly. The legislation is also developing rapidly, with cybersecurity acts in EU and California creating further regulat... Read More |
HOW TO BECOME A CYBERSECURITY CONSULTANT video Jul 08, 2019 John Torres, president of Guidepost Solutions' Security & Technology Practice, talks about potential career paths for cybersecurity consultants in this clip from the Cyber Work podcast. Read More |
PREVENTING AND REPAIRING SECURITY BREACHES video Jul 08, 2019 John Torres, president of Guidepost Solutions' Security & Technology Practice, discusses data security breaches, protecting organizations from online and physical threats, and career paths for those looking to pursue a career in cybersecurity. Read More |
ENTERPRISE AND CYBER SECURITY video Jul 08, 2019 Strong cybersecurity is critical for trust. But, does new tech mean new threats? Our Director of Cyber Security and Consulting, Haroon Malik, shares more at Fujitsu World Tour. Read More |
8 CYBERSECURITY PREDICTIONS FOR 2019 infographic Jul 08, 2019 A cyberattack on an automobile will kill someone. We’ve already seen hackers remotely kill a Jeep on the highway, disable safety features like air bags and antilock brakes, and hack into a car’s Bluetooth and OnStar features. As cars become more connected and driverless cars evolve, hack... Read More |
|
6 HEALTHCARE CYBERSECURITY TIPS THAT COULD SAVE THOUSANDS video Jul 08, 2019 Chances are you don’t want to spend $50,000 or more in fines for a HIPAA violation, so it’s more critical than ever for you and your healthcare organization to implement the required cybersecurity protocols to ensure you’re protecting sensitive patient data from cybercriminals and ... Read More |
HOW TO SECURE YOUR MID-SIZE ORGANIZATION FROM THE NEXT CYBER ATTACK article Jul 08, 2019 Cyber-attacks have become very common these days, and it is carried out on a full-scale. More and more mid-sized organizations are frequently targetted. However, as for the cybersecurity personnel who think that mid-sized organizations are safe, you guys need to think again! By far, the online attac... Read More |
STATE AND LOCAL AGENCIES CAN BOOST CYBERSECURITY WITH FEDERAL SUPPORT article Jul 08, 2019 Security is not a one-time event: Everyone knows it takes constant monitoring to detect and shore up weaknesses, find and patch vulnerabilities, and stay on top of constantly evolving threats. This requires time, expertise, tools and money — but help is at hand. The U.S. Department of Homeland... Read More |
EVERYTHING YOU NEED TO KNOW TO GET STARTED IN CYBERSECURITY article Jul 08, 2019 The cybersecurity skills shortage is a pressing concern for businesses, with the current shortfall estimated to be around 2 million unfilled positions, a number that is expected to rise to around 3.5 million by 2021. If there’s an upside to this shortage, it is that for those interested in a c... Read More |
WHY 5G AND AI WILL DETERMINE CYBERSECURITY STRATEGY FOR THE NEXT DECADE article Jul 08, 2019 BI.ZONE CEO Dmitry Samartsev and World Economic Forum head of operations William Dixon analysed the most popular technologies and evaluated the cyber risks of tomorrow. Experts talked about the three technologies that are likely to determine the next decade expressed in a joint analytical article. O... Read More |
HOW SECURE IS YOUR BUILDING AUTOMATION SYSTEM (BAS)? infographic Jul 07, 2019 Building automation systems (BAS) may be as critical as industrial control systems (ICS) in terms of safety and security, yet receive much less attention from the security community. Enhancing BAS cybersecurity programs with device visibility and network monitoring can give organizations a thorough ... Read More |
THE ECONOMIC VALUE OF DNS SECURITY whitepaper Jul 07, 2019 New stories of widescale cybersecurity hacks, crimes and vulnerabilities seem to pop up on a daily basis. The constant stream of adverse cyber events has unfortunately caused many small businesses and consumers to live with a dread of inevitability — no matter what they do to protect themselve... Read More |
31 MUST-KNOW HEALTHCARE CYBERSECURITY STATISTICS FOR 2019 article Jul 07, 2019 The healthcare industry is a prime target of hackers. The importance of cybersecurity in healthcare is an essential consideration for all organizations handling patient data. Be aware of the latest threats; read our article on the latest Healthcare Cybersecurity Statistics. Cybersecurity Healthcare ... Read More |
THE CRITICAL SHORTAGE OF CYBERSECURITY EXPERTISE article Jul 04, 2019 For many Canadians, the world of cyberattacks and hackers still seems far removed from their day-to-day activities. Perception, however, does not always match reality. Anyone employed by a sizable business in the private or public sector works in a place where cybersecurity is taken very seriously. ... Read More |
HOW TO MAKE SENSE OF CYBERSECURITY FRAMEWORKS article Jul 04, 2019 Every time when we have something precious, it is human nature to preserve it from any external damage or threat. Be it the money, jewelry, or properties we ensure everything is safe and intact by practicing due security measures. As a result, sighting security guards is no big deal, as the world ar... Read More |
WHITE PAPER: 3 REQUIREMENTS FOR SECURE DIGITAL TRANSFORMATION whitepaper Jul 04, 2019 As data breaches continue to disrupt business in the increasingly cloud-driven world, it’s clear the traditional approach to cybersecurity doesn’t cut it. Securing digital transformation without slowing down the business requires a new school of cybersecurity thought. An integrated approach – harnes... Read More |
THE MOST TELLING CYBER SECURITY STATISTICS IN 2019 infographic Jul 03, 2019 Cybersecurity is often seen as one of those big problems that only large entities like banks, tech companies, and governments have to worry about. In reality, a lot more people should be concerned with cybersecurity and not just the big corporations. The latter may be indeed responsible for more dat... Read More |
THE ABC’S OF CYBERSECURITY video Jul 03, 2019 Are you ready for the ABC’s and 123’s of Cybersecurity? John Matthew Holt, Founder & CTO of Waratek schools businesses in a great lesson of understanding the basics of protecting your cyber environment. Listen in. Read More |
CYBERSECURITY: A NUDGE IN THE RIGHT DIRECTION infographic Jul 02, 2019 Knowing the right thing to do doesn’t always translate into doing the right thing. We all know there are speed limits, but we often break them. Traditional cybersecurity awareness programs usually present what to do, why to do it, examples of doing it and so forth, but people frequently still ... Read More |
SIRCAM: WORM, VIRUS, TROJAN HORSE? article Jul 02, 2019 At Exabeam, we’re not only interested in developing the newest cybersecurity, we’re also fascinated by what we can learn from older security technologies. Each month the History of Cybersecurity 2019 Calendar features key dates in cybersecurity history, along with a related trivia questi... Read More |
PHISHING, CRYPTOCURRENCY ATTACKS THREATEN DATA SECURITY – MICROSOFT article Jul 02, 2019 Microsoft has advised government and business organisations to put adequate security in place to prevent cyberattacks through phishing and cryptocurrency in the coming months. Speaking at a cybersecurity roundtable in Lagos, the company said it had observed rising incidents of Enterprise Resource Pl... Read More |
QATAR ISSUES AVIATION CYBERSECURITY GUIDELINES article Jul 01, 2019 To help avoid disruption of civil aviation operations, the Civil Aviation Authority of Qatar and the Ministry of Communications and Transport have issued cybersecurity guidelines. CAA's new guidelines suggest organizations develop effective risk management, build a structure to respond to breach... Read More |
RISING ATTACKS OF RANSOMWARE 2019 infographic Jul 01, 2019 Rising Attacks of Ransomware 2019. Biggest Ransomware Attacks. Ransomware is a form of malware or a virus that prevents users from accessing their systems or data until a sum of money is paid. Industry Facts in Numbers 50% of 582 surveyed cybersecurity professionals do not believe their organization... Read More |
|
|
MULTIFACTOR AUTHENTICATION IS NOT UNHACKABLE infographic Jun 30, 2019 MULTIFACTOR AUTHENTICATION IS NOT UNHACKABLE. There are more than 12 WAYS to bypass MFA 41% of civilian agency user accounts DO NOT use multifactor authentication. 48% of cybersecurity breaches are NOT PREVENTABLE by strong multifactor authentication. Read More |
CYBER SECURITY IN THE FINANCIAL INDUSTRY infographic Jun 30, 2019 From complying with industry regulations to meeting evolving customer demands and increasing uptime, institutions within the financial sector each face a unique set of pain points. One challenge they all share is combating the growing cybersecurity threat. Read More |
CYBERSECURITY JARGON BUSTER whitepaper Jun 30, 2019 An enhanced means of verifying identity that requires you to present two pieces of evidence – your credentials –in order to gain access to an account or other secure/restricted area. Your credentials fall into any of these three categories: something you know (like a password or PIN), so... Read More |
THE IMPOSSIBLE PUZZLE OF CYBERSECURITY whitepaper Jun 29, 2019 Results of an independent survey of 3,100 IT managers commissioned by Sophos Cybersecurity just isn’t getting any easier. While protection technologies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. At the same time, the growing complexity of threats m... Read More |
THE NEED FOR A DIVERSE CYBERSECURITY INDUSTRY IS REAL article Jun 27, 2019 The word “diversity” has become a buzzword among technical professionals and has been overused many times with little or no meaning to it. Instead of exploiting the word, brands and companies need to prove it. The reality is that cybersecurity lacks diversity, and this article will help ... Read More |
NIST RELEASES IOT CYBER SECURITY AND PRIVACY RISKS REPORT article Jun 27, 2019 There are many enterprises already reaping the benefits of leveraging the Internet of Things (IoT) technology and devices, however as Bain & Company reports, “The IoT could be growing even faster with better cyber security.” In fact, their research shows that customers would pay 22% ... Read More |
|
HOW TO MAKE CYBERSECURITY RESONATE WITH EMPLOYEES article Jun 27, 2019 Organisations are facing increased threats from cyber attacks, and employees are often the weakest link in their defence posture. As much as you might hope that common sense would prevail, the reality is that best practices can often go in one ear and out the other. Employees who aren’t proper... Read More |
DRAFTING AN APPROPRIATE CYBERSECURITY POLICY article Jun 26, 2019 Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent cybersecurity plan, you’re still at risk of being attacked; it’s simply the reality of today’s world. ... Read More |
HOW TO FIND THE BEST CYBERSECURITY CAREER FIT infographic Jun 25, 2019 Cybersecurity is becoming one of the number one concerns for companies and organizations all around the world. With cybercrime at an all-time high, there’s a huge demand for cybersecurity professionals, and with not enough security professionals available, there’s a big gap in the workfo... Read More |
HOW MACHINE LEARNING WITHIN INCMAN SOAR EMPOWERS SECURITY ANALYSTS article Jun 25, 2019 In a recent blog post we took a look at the differences between Artificial Intelligence (AI) and Machine Learning (ML) and how today there were being used within the cybersecurity industry to help fight the growing number and sophistication of cyber attacks. Artificial intelligence and machine learn... Read More |
ESET CYBERSECURITY TIPS & TRICKS: TYPES OF MALWARE video Jun 25, 2019 You may often hear experts refer to malware, trojan horses, ransomware, worms, spyware, viruses, etc. What do these terms mean and how does it concern you or your business? Find out in the next episode of ESET Cybersecurity tips & tricks. Read More |
ADVANCING THE STUDY OF CYBERSECURITY video Jun 25, 2019 Cedarville University's Center for the Advancement of Cybersecurity is advancing the study of cybersecurity by developing future leaders in the field, shaping cyber education, and promoting cyber awareness in society. Read More |
|
CALCULATING YOUR CYBERSECURITY NET WORTH DOESN'T HAVE TO BE COMPLEX article Jun 24, 2019 Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports include financial and non-financial assets as well as all accumulated liabilities in order to determine if the company is profita... Read More |
CURRENT CYBERSECURITY MARKET STRONG: WHAT’S DRIVING IT? article Jun 24, 2019 Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and networ... Read More |
THE WEEK IN SECURITY: RETHINKING SECURITY IN AN AGE OF CYBER INSECURITY article Jun 24, 2019 It might all have been easier if the Internet had never existed, but the compromise of WhatsApp reflects the ever-changing nature of attacks in today’s cybersecurity threat climate. One approach to hardening vulnerable data has been to use field-level encryption, with MongoDB storing its data ... Read More |
NIST ISSUES NEW CYBER GUIDELINES FOR CONTRACTORS article Jun 24, 2019 The National Institute of Standards and Technology has issued draft security guidance to help contractors working with high-value assets protect the unclassified (but still sensitive) government data that resides on their networks against advanced persistent threats and other attacks. A draft versio... Read More |
|
5 WAYS AGENCIES CAN CLEAN UP THEIR CYBER HYGIENE article Jun 24, 2019 Since the concept of cyber hygiene was described by Vinton Cerf in an address to Congress in 2000, government agencies have been cognizant of maintaining a holistic view of their security posture. In fact, in recent years there have been numerous efforts made to improve how agencies maintain their c... Read More |
CYBERSECURITY FOR SMALL BUSINESS whitepaper Jun 23, 2019 CYBERSECURITY BASICS. Cyber criminals target companies of all sizes. Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack. Update your software This includes your apps, web browsers, and operating systems. Set update... Read More |
2019 CYBERSECURITY PREDICTIONS infographic Jun 23, 2019 2018 was most definitely the year of cybersecurity. We saw an unprecedented number of data breaches, most at a scale which had never been seen before. Of course we also saw the introduction of the highly anticipated General Data Regulation Protection, or GDPR, which caused quite a stir among busines... Read More |
|
NEXT-GENERATION ENTERPRISE CYBERSECURITY SOLUTIONS article Jun 21, 2019 As technology becomes more deeply embedded into business and society in general, business owners and cybersecurity professionals are facing the task of our generation. That is, securing the global IT infrastructure from those cybercriminals who want to steal data, blackmail big corporations, and tak... Read More |
SANS 2019 STATE OF OT/ICS CYBERSECURITY SECURITY SURVEY infographic Jun 21, 2019 People remain the greatest threat to industrial control systems (ICS) and associated networks, according to a SANS survey focused on better understanding cybersecurity risks to operational technology (OT) systems. More than half of respondents also see the cyber risks to their safe and reliable oper... Read More |
BUSINESSES AND CHARITIES EXPERIENCING MORE CYBERSECURITY BREACHES article Jun 21, 2019 Thirty-two percent of businesses and 22 percent of charities are experiencing more cybersecurity attacks, the 2019 Cyber Security Breaches Survey says. The average annual cost for business that lost data or assets after breaches was more than $5,000 and more than $12,000 for charities. Among the 32 ... Read More |
REINVENTING CYBERSECURITY WITH ARTIFICIAL INTELLIGENCE whitepaper Jun 20, 2019 Artificial intelligence (AI) has already been deployed in a multitude of applications to increase productivity, improve sales or enhance experiences. However, one crucial, though often overlooked AI application, is the focus of this report – enhancing protection against cyberattacks. When used... Read More |
CYBERSECURITY PORTFOLIO FOR BUSINESS video Jun 20, 2019 Kaspersky’s Cybersecurity portfolio for business reflects the security demands of today’s businesses, responding to the needs of organizations at different levels of maturity with a step-by-step approach. Read More |
SANS 2019 STATE OF OT/ICS CYBERSECURITY SURVEY whitepaper Jun 19, 2019 The 2019 SANS OT/ICS Cybersecurity Survey explores the challenges involved with design, operation and risk management of an industrial control system (ICS), its cyber assets and communication protocols, and supporting operations. This year, SANS focused more broadly on the operational technology (OT... Read More |
CYBERSECURITY IN KONE’S 24/7 CONNECTED SERVICES video Jun 19, 2019 KONE secures access to its 24/7 predictive maintenance services with IBM Cloud AppID. Authenticating users and managing user-specific profiles ensures KONE technicians and customers access only the features their role authorizes. Read More |
CYBERSECURITY, DATA PRIVACY TOP CONCERNS FOR ENTERPRISES article Jun 19, 2019 Cybersecurity and data privacy captured the two top spots in respondents’ list of E&C concerns, according to the 2019 Definitive Corporate Compliance Benchmark Report. Data security and privacy breaches have become a daily worry for most organizations and research shows that most organizat... Read More |
CYBERSECURITY MANAGEMENT AND OVERSIGHT AT THE JET PROPULSION LABORATORY whitepaper Jun 18, 2019 NASA’s Jet Propulsion Laboratory (JPL) is a federally funded research and development center in Pasadena, California. Since 1959, the California Institute of Technology (Caltech) has been under contract with NASA to manage JPL, most prominently its research and development activities, but also... Read More |
WHO’S RESPONSIBILITY IS CYBERSECURITY? video Jun 17, 2019 Whose job is it to ensure that users are safe online? From device and IoT manufacturers to cybersecurity companies to users themselves, learn what part each one plays when it comes to upholding the collective responsibility that is cybersecurity. Read More |
CYBERSECURITY: RAISING AWARENESS TO PREVENT ATTACKS video Jun 13, 2019 2019 Leadership Exchange: Third-party risk can be costly and time-consuming when best practices aren’t implemented. Supply chain risk, which arises when a third party hires a fourth or a fifth party, escalates the threat of data loss or proprietary resource exposure. Read More |
|
CYBERSECURITY FUTURES 2025 whitepaper Jun 12, 2019 Cybersecurity, broadly defined, is the master problem of the Internet era The problem set is evolving more quickly than is our understanding of it (and our ability to ‘solve’) Different countries and industries will grapple with these challenges in different ways Gaining foresight into t... Read More |
EU CYBERSECURITY infographic Jun 11, 2019 How and why to improve EU cyber security WHY? The EU works to face cyber threats and challenges, but also to grasp opportunities. Opportunities. The transition to a digital single market can bring benefits such as 5G and connectivity: 64 to 75% of Europeans believe that digital technologies have a p... Read More |
CYBERSECURITY PROS THINK THE ENEMY IS WINNING article Jun 11, 2019 There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a-mouse game is wearing on security professionals, and many feel they are losing in the war against cybercriminals. The first figures are from the Informati... Read More |
3 KEYS TO POWERFUL YET PRACTICAL CYBERSECURITY video Jun 11, 2019 With signature-based anti-virus catching only 47% of endpoint compromises, and 84% of breaches involving multiple endpoints, it’s clear that “Detection Deficit Disorder” has reached epidemic proportions. The cybersecurity market is certainly not short on over-hyped tools designed t... Read More |
THE IMPORTANCE OF A CYBERSECURITY STRATEGY FOR THE BUSINESS article Jun 11, 2019 Research conducted by AV-Test, an independent IT security institute, has revealed that nearly 350,000 new malware programs are created daily. It is unfortunate that some companies still consider malware to be a minor threat, not realizing that something as trivial as a malware-infected email may be ... Read More |
|
WHAT TO LOOK FOR IN A CYBERSECURITY OPEN ECOSYSTEM whitepaper Jun 10, 2019 Enterprise IT is growing more complex, with rapid advances in areas ranging from multi-cloud to microservices, from machine learning to containers. One global survey of CIOs reveals that a single mobile or web transaction crosses about 35 different technology systems, up from 22 only five years ago.... Read More |
SOLVING THE CYBERSECURITY SKILLS SHORTAGE WITHIN YOUR ORGANIZATION infographic Jun 10, 2019 A seemingly endless supply of new and increasingly more complex cyber-attacks has been driving up the demand for qualified professionals to help defend businesses. But are we prepared to supply these professionals to meet this growing demand? It doesn’t look that way, as 74 percent of responde... Read More |
VULNERABILITY SCANNING – IN HOUSE OR THIRD PARTY? article Jun 10, 2019 You can’t fix the flaws you don’t know about – and the clearer your sense of your organization’s overall security posture, the better equipped you are to improve it. Vulnerability assessments are a core requirement for IT security, and conducting them on a regular basis can h... Read More |
GOOD ENOUGH SECURITY ISN'T GOOD ENOUGH article Jun 10, 2019 Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an ostrich putting its head in the sand or an opossum playing dead to ignore an impending thre... Read More |
PUTTING HEALTHCARE SECURITY UNDER THE MICROSCOPE whitepaper Jun 09, 2019 Forescout analyzes deployment data to better understand the cybersecurity risks facing healthcare organizations today. The Internet of Medical Things (IoMT) continues to offer exciting possibilities for healthcare organizations to improve patient care. However, this digital transformation and increa... Read More |
THREE CYBERSECURITY CHALLENGES EVERY ENTERPRISE NEEDS TO ADDRESS infographic Jun 09, 2019 Cybercriminals are becoming increasingly proficient at infiltrating enterprises to steal data for profit, acquire intellectual assets or to simply cause destruction. High profile breaches frequently making the headlines however are just the tip of the iceberg with global losses due to cybercrime pro... Read More |
BINDING LINK BETWEEN CYBER WARFARE AND IT SECURITY article Jun 09, 2019 Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over th... Read More |
CYBERSECURITY FOR END-USERS: AWARENESS IS A MEANS, NOT A GOAL article Jun 09, 2019 Due to the many cyber attacks that have taken place in recent years, organisations and (local) governments are increasingly putting cybersecurity on the agenda as a problem that needs to be tackled. Historically viewed as ‘merely an IT problem’ that can be solved through better programmi... Read More |
BEHIND THE DARK NET BLACK MIRROR THREATS AGAINST THE ENTERPRISE whitepaper Jun 07, 2019 organizations are expected to spend on cybersecurity products and services cumulatively from 2017-20212 . We can do better. Cybercriminals always seem to be a step ahead of enterprise security efforts, and a growing proliferation of dark net platforms is making it easier for them. Only with a thorou... Read More |
18 CYBER-ATTACKS THAT SHOOK THE WEB infographic Jun 06, 2019 With 2019 being MailGuard’s 18th birthday, we’ve rounded up 18 of the biggest and most noteworthy cyber-attacks that shook the web, and changed how we look at cybersecurity. Sony PlayStation 1 Famously known as an ‘identity-the¬ bonanza’, it was reported that an “il... Read More |
NAVIGATING NETWORK SECURITY COMPLEXITY whitepaper Jun 06, 2019 In April 2019, the Enterprise Strategy Group (ESG) completed a research survey of 200 cybersecurity, IT, and networking professionals with purchase process responsibility for networking and/or security technologies at their organizations. Further descriptions of the research methodology and survey d... Read More |
WHY YOUR EMPLOYEES ARE A CYBERSECURITY THREAT article Jun 06, 2019 In mid-April, Bodybuilding.com announced that its company network had been breached by hackers. This would only be a blip in the endless stream of data breach headlines – security firm Positive Technologies reports that cyberattacks affected billions of people in 2018 – except that it wa... Read More |
6 BOOKMARK WORTHY CYBER SECURITY BLOGS YOU SHOULD FOLLOW RIGHT AWAY article Jun 06, 2019 Online security and data privacy are two of the hottest topics in the industry at present. And if you are someone who is working in the domain of cyber security or planning to pursue a career in cybersecurity, it is imperative to stay updated with the ongoing trends in the domain. While many people ... Read More |
CYBERSECURITY ATTACKS 101: PHISHING, CRYPTOJACKING AND RANSOMWARE article Jun 04, 2019 Malware is getting smarter. Cybercriminals now use artificial intelligence and machine learning tools to get better at tricking users into running malicious code and giving away sensitive data. Three client-side attacks have been among the most popular over the past two years and will remain threats... Read More |
NEXT GENERATION CYBER THREATS: IMAGES article May 31, 2019 Cybersecurity is probably the most rapidly changing area of IT, and cyber-criminals are becoming increasingly more sophisticated in their bid to breach an organization's security and steal their crown jewels - their information. Traditional Data Loss Prevention (DLP) technology provides protecti... Read More |
|
12 BEST CYBERSECURITY PRACTICES IN 2019 article May 30, 2019 It’s no exaggeration: any company can fall victim to cyber crime. Reports of cyber attacks come from government organizations, educational and healthcare institutions, banks, law firms, nonprofits, and many other organizations. Hackers, insider threats, ransomware, and other dangers are out th... Read More |
|