THE GLOBAL CYBER SECURITY BATTLE
LAPTOPS WILL BE THE ARTILLERY OF THE FUTURE By David J. O’Reilly, Managing Director, Hampton Court Capital Every political and military conflict now has a cybersecurity aspect to it, which […]
Password security: It’s like sellotaping your house key to the front door…
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. Last month we saw Barack Obama’s final mic drop as President, Kim Kardashian’s finally stable and secure enough to get back into […]
The information sharing methods
By Milica D. Djekic The information could be shared through many different means and right here we would discuss how they can leak out from some organization using insider’s threat […]
Improve Company Cyber Security While Staying on Budget
By Maricel Tabalba Cybersecurity is a critical issue for any business owner, and modern businesses face an ever-evolving threat when it comes to keeping themselves and their customers protected. In […]
IoT Devices Require Security-First Design
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010. Its sophistication and purpose […]
Tips to Help Boost the Security of Your MySQL Database
By Sujain Thomas, Security of Your MySQL Database, Remote DBA If you have been keen on database security news, you may have heard of the attacks on MySQL databases. The […]
Best Practices in Cyber Security for Businesses
By Tim Green Cybersecurity–information technology security–is the practice of protecting computers, applications, data, and networks from illegal access. From hacking to computer viruses, to phishing emails and calls, efficient cybersecurity […]
Three Tips to Avoid Going Phishing
By Travis Rosiek, CTO, Tychon It’s an old trick in the physical world. Getting into a secured building is easiest if an infiltrator can get an authorized person to open […]
Office Depot
Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant sets of responsibilities. There are pressures from the staff, management, corporate office, and […]
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young […]
How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the […]
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data. […]
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
Twitter uncovered a possible nation-state attack
Twitter discovered a possible nation-state attack while it was investigating an information disclosure flaw affecting its platform. Experts at Twitter discovered a possible state-sponsored attack while they were investigating an information disclosure […]
Bitcoin Core Team fixes a critical DDoS flaw in wallet software
Bitcoin Core Software fixed a critical DDoS attack vulnerability in the Bitcoin Core wallet software tracked as CVE-2018-17144. The Bitcoin Core team urges miners to update client software with the […]