Europe Cybersecurity Market Size to Steer At 13% CAGR To 2025
Europe Cybersecurity Market is estimated to be over USD 25 billion in 2018 and is expected to register a lucrative growth between 2019 and 2025 with a CAGR of over […]
How To Mitigate The Risks Of Remote Desktop Protocol
By Chris Morales, head of security analytics at Vectra Remote Desktop Protocol (RDP) is an invaluable tool for any business wanting to save money and create efficiencies through centrally controlling […]
Really, Imagine a Day Without Water
By Michael Yehoshua On October 23, toothpaste maker Colgate and world champion swimmer, Michael Phelps, the ambassador for the company’s Save Water initiative, headed over 1,100 organizations across the United […]
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, […]
New Security Report Highlights Trends in Mid-Market Business Malware
By Emil Hozan, Security Analyst, WatchGuard Technologies As the security landscape continues to grow and shift, WatchGuard’s Threat Lab research team continues to offer insights into the latest malware and […]
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets […]
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to […]
The Rise of Cybercrime-As-A-Service
And What It Means for Businesses By Mark Belgrove, Head of Cyber Consultancy, Exponential-e In a sea of increasingly complex cyber warfare and nation-state hackers, it can be easy to […]
Protecting Against Modern Cyberattacks
By Bala Sethunathan, CISO and Global Director of the Security Practice at SoftwareONE Modern cyberattacks are increasing in complexity and sophistication, as hackers are developing attack tools at a faster […]
Oh, my! PerCSoft’s Irony
By Charles Parker, II; MBA/MSA/JD/LLM/PhD PerCSoft is a Wisconsin business. The organization provides online data backup services for dental offices. This operates by placing data in the cloud. They had […]
Sprint Beta Testing 5G Smart City in Georgia
By Kayla Matthews, Freelance Writer, Productivity Bytes Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though the test doesn’t encompass the whole city, it […]
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology […]
Secure Data Is Gold: U.S. Immigration Options for Cybersecurity Experts
By Lin Rose Walker, Esq. and Scott R. Malyk, Esq. A decade ago, very few people outside of the Information Technology (IT) industry knew what cybersecurity was or even considered […]
How Cybersecurity Became a Major Issue for Your Business’ SEO
By Chester Cybersecurity is no longer a niche issue that you can afford to ignore. Every year, half of all businesses report being hacked, and this can cause huge problems […]
How to Erase Data from Mobile Devices: Four Common Misconceptions
By Mark Dobson, ITAD Specialist, NextUse When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the company data stored on them to end […]
In A World of External Threats, How Are Businesses Putting Themselves In Jeopardy?
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions Just about every possible facet of your personal information can be subject to compromise: credit card or social security numbers, social media […]
How to Keep Your Customer’s Credit Card Information Safe
Strong cybersecurity goes without question By John Shin, Managing Direction, RSI Security Protecting customer data is closely related to delivering satisfying customer experience. An enjoyable meal in a beautiful restaurant […]
Simple Ways SMBs Can Protect Themselves against Cyber-Threats
By John Ford, Chief Information Security Officer, ConnectWise It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a massive data […]
How to Suggest Your Manager to Invest into Cyber Defense?
By Milica D. Djekic The first personal computers would appear in the early 80s of the 20th century. Since then the entire technological posture has changed and evolved so rapidly, […]
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts, […]
The Social Engineering Methods and Countermeasures
By Milica D. Djekic During the time, the people would always try to get what some individuals being the part of some group would assume as so confidential to them. […]
How to Build an Effective Insider Threat Program: Part I
By Shareth Ben, Insider Threat SME at Securonix On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks and threats from […]
Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially […]
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it […]
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems […]
Facial Recognition: Killing the Password One Photo ID at a Time
By Stephen Stuut, CEO of Jumio In today’s complex cybersecurity landscape, the notion of utilizing a password to validate a The user’s authenticity is rudimentary. Cybercriminals can retrieve passwords in […]
No One Likes Passwords, So Why Are We Still Using Them?
Users Deserve Better, Websites Need to Deliver By Charles Durkin, Chief Executive Officer, Privakey Creating a new online account is a dreaded task for most internet users. Complexity and security […]
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of […]
Adding Efficiency to Security
By Dave Thompson, Senior Director, Product Management, LightCyber The words “operational efficiency” and “security” are generally not commonly used together. I’m amazed that after 20 years in the networking/network security […]
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion […]