How the Internet of Things Could Compromise Online Security
By Chris Usatenko, Content Creator, EveryCloud The concept of an Internet of Things has been a dream held by many tech geeks. Up until a few years ago, though, the…
Do You Know What That App Is Doing?
The IT Security Risk of Third-Party Apps By Christopher Kennessey, CEO, NetMotion Software As mobile devices become more common in the workplace, IT departments need to understand and prepare for…
Ransomware: A Municipality’s Achilles Heel
By Russ Cohen, Vice President of Cyber Services, Chubb From large metropolitan cities like Atlanta to smaller communities like Key Biscayne, every city in America is vulnerable to cyber-attacks. In…
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all…
Attracting and Retaining Staff for a Fusion Center
The best way to collaborate talent within a security eco-system By Karl Sharman Fusion Centers were formed following the devastating 9/11 terrorist attacks in New York and now mainly form…
Security Research as an Anti-Malware Secret Weapon
By Milica D. Djekic Any malware being known to the cyber community or still getting the status of the advanced persistent threat is the potential risk to your IT asset….
Preventing Business Email Compromise – a $300 Million Dollar Problem
Organizations Heavily Invested in Security Solutions Fall Victim to Social Engineering Attacks and Human Error By Ameet Naik, Director of Product Marketing, Armorblox A recent report from the Financial Crimes…
The Need of Automatics and Control in Incident Response
By Milica D. Djekic The incident response as a cyber defense active measure could require the highly skillful IT security professionals who should get capable to detect, handle and mitigate…
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card…
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced…
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes…
What Other Companies Can Learn from Facebook’s $5 Billion Fine
Organizations need to view government demands as the floor rather than the ceiling when it comes to protecting consumer data By Jacob Serpa, researcher, Bitglass While Facebook’s $5 billion settlement…