What have we learned from WannaCry?

What have we learned from WannaCry?

We need to convince people to proactively guard against ransomware.

06/16/17

Learn What NIST’s Cybersecurity Framework Can Do For You

Learn What NIST’s Cybersecurity Framework Can Do For You

NIST cybersecurity framework (CSF)

06/06/17

Do you know where your data is?

Do you know where your data is?

Third-party risk is very real – your company’s reputation may be in your vendor’s hands.

05/23/17

How CISOs should address their boards about security

How CISOs should address their boards about security

CISOs can't wait until after a breach to talk with their board of directors. They must have regular discussions to ensure they're on the same page on security priorities.

04/25/17

7 steps to avoid getting hooked by phishing scams

7 steps to avoid getting hooked by phishing scams

Here are seven simple steps that will safeguard you and your business from phishing attacks.

04/11/17

Protect your unstructured data with user behavior analytics

Protect your unstructured data with user behavior analytics

Coupled with solid perimeter defenses, user behavior analytics is a powerful asset in the fight against data theft.

03/21/17

Botnets: Is your network really protected?

Botnets: Is your network really protected?

Security is taking a backseat as more IoT devices connect to the internet, making it possible for botnets to attack networks.

03/13/17

What is OWASP, and why it matters for AppSec

What is OWASP, and why it matters for AppSec

Boost your application security (AppSec) with the Open Web Application Security Project (OWASP) guidelines.

02/22/17

Hackers show no mercy—even for pot dispensaries

Hackers show no mercy—even for pot dispensaries

Anatomy of a national point-of-sale hack and takedown of more than 1,000 marijuana dispensaries

02/13/17

6 ways to launch a targeted cyberattack

6 ways to launch a targeted cyberattack

The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to...

01/30/17

Fighting cybercrime using IoT and AI-based automation

Fighting cybercrime using IoT and AI-based automation

Cognitive security systems could be a powerful ally in the fight against cybercrime, providing early threat detection and autonomously responding to threats.

01/17/17

IoT could be our downfall

IoT could be our downfall

We need to secure the internet of things.

12/20/16

5 cybersecurity trends to watch for 2017

A mix of fresh and familiar threats and problems will concern IT departments in the year ahead.

12/14/16

What is the General Data Protection Regulation and why should you care?

What is the General Data Protection Regulation and why should you care?

Find out how to prepare for new EU legislation on data collection and data protection.

11/15/16

How much does a data breach actually cost?

How much does a data breach actually cost?

When it comes to measuring the cost of a data breach, size matters. The more records lost, the higher the cost.

10/28/16

7 steps to proactive security

7 steps to proactive security

The key to securing against data breaches lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water.

10/21/16

Always be prepared: Monitor, analyze and test your security

Always be prepared: Monitor, analyze and test your security

Critical Security Controls: Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20.

09/27/16

Does the NSA have a duty to disclose zero-day exploits?

Does the NSA have a duty to disclose zero-day exploits?

The National Security Agency (NSA) should disclose all zero-day exploits. But it doesn't.

09/12/16

Hired guns: The rise of the virtual CISO

Hired guns: The rise of the virtual CISO

When should you hire a virtual chief information security officer (CISO)?

08/05/16

Cybersecurity is only as strong as your weakest link—your employees

Cybersecurity is only as strong as your weakest link—your employees

Stay on top of account management and assess staff cybersecurity skills with CIS Controls 16 and 17.

07/14/16

Load More