Where Property Insurance Ends and Cyber Insurance Begins—the Industry’s Biggest Issue More People Should Be Talking About
By Matt Prevost, Senior Vice President, Cyber Product Manager at Chubb Cyber-attacks are expected to cost companies more than $2 trillion in 2019, according to Juniper Research. Consequently, many companies—especially…
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it…
Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11…
Achieving Cybersecurity Readiness with AI-Powered, Gamified Training
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence “THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems…
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may…
Three Key Business Lessons From The Founder of a Big Data Security Company
By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to…
Adding Efficiency to Security
By Dave Thompson, Senior Director, Product Management, LightCyber The words “operational efficiency” and “security” are generally not commonly used together. I’m amazed that after 20 years in the networking/network security…
The packet analysis as a helpful way of network monitoring
By Milica D. Djekic The internet packets are the sets of information being created and transmitted to carry on a message through the network’s communications. These packets may consist of…
How Can You Tell If Your WordPress Site Has Been Hacked?
WordPress is the foundation of a large chunk of the web, which makes it an obvious target for criminals and hackers. If attackers find a vulnerability in WordPress, they have…
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why…
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility…
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public…