Latest Posts

Fa42af438e58b799189dd26386f5870f

Cyberattacks a Top Concern for Gov Workers

March 03, 2020 Added by:Ionut Arghire

More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Hackers Target Online Gambling Sites

February 19, 2020 Added by:Ionut Arghire

Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

Fa42af438e58b799189dd26386f5870f

SEC Shares Cybersecurity and Resiliency Observations

January 30, 2020 Added by:Ionut Arghire

The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

What Does Being Data-Centric Actually Look Like?

January 17, 2020 Added by:Sam Bocetta

Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business.

Comments  (0)

4ebb71b142fbe23222c175ac358e4700

The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

January 17, 2020 Added by:Zack Allen

Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.

Comments  (0)

C6029c2e2ed1d0a8594a28d81d32c8b5

Security Compass Receives Funding for Product Development and Expansion

January 17, 2020 Added by:Kevin Townsend

Toronto, Canada-based Security Compass has received additional funding from growth equity investment firm FTV Capital.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Password Shaming Isn’t Productive – Passwords Are Scary Business

January 15, 2020 Added by:Tim Mackey

With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Five Key Cyber-Attack Trends for This Year

January 14, 2020 Added by:Marc Wilczek

5 key cyber-attack trends that are expected to develop during the coming months.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

20/20 Vision on 2020's Network Security Challenges

January 13, 2020 Added by:Avishai Wool

Organizations will likely need to embrace more automation across all security and compliance-related processes.

Comments  (0)

73b84d66b198db6ac26bc8a35d479042

Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

Da780506fe493b3e556b28a66eed1e1e

Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys

December 19, 2019 Added by:Shwetha Sankari

Enforcing encryption key management can effectively bridge the gaps in your enterprise privileged access security strategy.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

The Cybersecurity Skills Gap: An Update for 2020

December 18, 2019 Added by:Sam Bocetta

2020 will be a critical juncture for the entire cybersecurity sector

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

Modernizing Web Filtering for K-12 Schools

December 18, 2019 Added by:Timur Kovalev

Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers

December 04, 2019 Added by:InfosecIsland News

University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

49319ce2596a7e7bfb0ef825a9e5ea50

What Is Next Generation SIEM? 8 Things to Look For

November 14, 2019 Added by:Avi Chesla

Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Cybersecurity and Online Trading: An Overview

October 25, 2019 Added by:Sam Bocetta

Take a look at how and why the risks of international trade are increasing, and the political response to this.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Artificial Intelligence: The Next Frontier in Information Security

October 23, 2019 Added by:Steve Durbin

The hype can lead to confusion and skepticism over what AI actually is and what it really means for business and security.

Comments  (0)