Author Description

Author Posts

Are We Solving The Right Problem?

By Mac McMillan, CEO, and President of CynergisTek If you do not live and work within the…

Iot Environment Compromising Cyber Security

It’s High Time to Explore What Iot I S Offering Cyber-Criminals, Need to Defend. By N Subash…

Warning Signs for Managing Cyber Security

By Josh Paape In 1997, the NSA attacked the Department of Defense information infrastructures and attempted to…

One in five android apps have numerous known security flaws

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. Study Finds One in Five of 700 Most Popular…

The impact of usability on phishing

Prevention effectiveness – the phishing threat By Andrew B. Goldberg, Chief Scientist, Inky Phish Fence Phishing emails…

How deception technology helps cios meet the challenges of cyber security

By Nahim Fazal, BAL – Cyber Threat Intelligence, CounterCraft World War II. Intense tank battles are taking…

Protect your business with layers of defense

Defending your network from malicious attacks takes more Then a platform’s native security features By Troy Gill,…

5 things everyone needs to know about cyber security

Practical ways to prevent a cyber-attack By Kevin Cassidy, CEO, ClearFocus® Technologies What do you think of…

On the clock

Why time is crucial in security execution By Brad O’Hearne DISCLAIMER: As with all security operations, always…

Local and state govt. Offices easy pickings for hackers

By Aviv Grafi, CEO of Votiro Perennially strapped for cash, understaffed and underfunded, local and even state…

Show Buttons
Hide Buttons