Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and…
Seven Security Predictions for 2020
By Corey Nachreiner Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year….
The Decade Ahead for Cybersecurity
By Matthew Gyde, CEO, Security, NTT Ltd. The Dawn of a New Era As 2020 dawns, we stand at the threshold of a new decade that’s certain to reveal challenges…
Seven Security Predictions For 2020
By Corey Nachreiner, CTO of WatchGuard Technologies Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions…
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view…
What’s the Security Misconfiguration Antidote? Automation.
By Joshua Williams, Senior Cloud and Automations Solutions Engineer, FireMon The collective security community is spending too time much worrying about vulnerabilities. They need to shift some of those resources…
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money…
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research…
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity…
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology…
Talk About a Disaster
Fema Exposes Disaster Survivor’s Personal Data By Charles Parker, II; MBA/MSA/JD/LLM/PhD FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.). Over the years, FEMA has had…
Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking
By Stephen Kovac, Vice President, Global Government Head of Corporate Compliance, Zscaler, Inc. Today’s workplace functions on the expectation of mobility – work from any device at any location. While…