Why Cyber Attacks are on the Rise in Higher Education

Higher education institutions—especially those conducting research programs in areas with potentially high economic payoff or those supporting sensitive government contracts—will face ongoing risks associated with Advanced Persistent Threat (APT) groups. These threat groups are also likely to continue to compromise academic networks to mask their activities and attain access to secondary targets.Financially motivated threat actors will remain an ongoing threat, especially against colleges and universities, given that such institutions tend to contain large amounts of Personally Identifiable Information (PII) such as student and other administrative records (including, for example, those containing government identification numbers) and the perception that these targets have more vulnerable security postures.
Watch Now


Most financial institutions used to allow customers to log in to their accounts with a simple username and password. But passwords are notoriously insecure - many users choose weak passwords that can be easily guessed or cracked. In an effort to help strengthen security, large numbers of banks began


Top 5 Reasons Data Breaches Keep Occurring

"James Hanlon, Security Strategist at Symantec breaks down the Top 5 reasons that cyber attacks and data breaches continue to happen, and more importantly, gives his suggestions for how you can reduce the risks to your organisation."

Webinar: 5 Cybersecurity Trends for 2016

Do you know where your enterprise will be most at risk in 2016? Every new year brings unwelcome security surprises. But the next 12 months will witness a new twist in the cybersecurity story.The very development that’s exciting so many enterprises – the Internet of Things (IoT) – could leave them critically exposed. Embedding IP into more devices opens up multiple points of entry on what we carry, wear, or attach to machines. Suddenly, the threats are getting close and personal–everywhere.

Mobile Application Security Assessments

Denim Group

I’ll be doing a webinar on mobile application security assessments on Wednesday October 22nd. We’ll be talking about how security issues can exist in code deployed on a mobile device, in corporate web services backing the device, in any third party supporting services as well as in the interactions between any of these components. The webinar will characterize the most common and most damaging mobile application security vulnerabilities as well as where these vulnerabilities are found and the testing activities that identify them. My goal is that attendees will walk away with a better understanding of the scope of potential mobile application security issues as well as statistics that can be used as a quantitative basis for crafting mobile application security programs.

Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk

"The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering."