Improve Company Cyber Security While Staying on Budget
By Maricel Tabalba Cybersecurity is a critical issue for any business owner, and modern businesses face an ever-evolving threat when it comes to keeping themselves and their customers protected. In…
IoT Devices Require Security-First Design
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010. Its sophistication and purpose…
Best Practices in Cyber Security for Businesses
By Tim Green Cybersecurity–information technology security–is the practice of protecting computers, applications, data, and networks from illegal access. From hacking to computer viruses, to phishing emails and calls, efficient cybersecurity…
Three Tips to Avoid Going Phishing
By Travis Rosiek, CTO, Tychon It’s an old trick in the physical world. Getting into a secured building is easiest if an infiltrator can get an authorized person to open…
The Fatal Danger Lurking in Today’s Fortune 500
By Tatu Ylonen, founder and SSH Fellow, SSH Communications Security It takes a special combination of leaders, ideas, and processes to become a Fortune 500 company. By the time an…
The Myth Behind Frequent Password Changes
Are they good practice or counterproductive? By Sarosh Petkar, BS/MS Student, Computing Security – RIT INTRODUCTION Mandatory password changes are an age-old security practice within numerous organizations. This practice is…
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated…
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for…
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from…
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory…
The Dawn of the DDoS of Things (DoT)
Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led…
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their…