Charles Cooper

Writer

Charles Cooper is an award-winning technology journalist who has covered the IT industry for the past three decades. He has held executive news posts at CNET, ZDNet and PC Week.

Digital wallets open up cyber vulnerabilities

As digital wallets increase in popularity, more and more businesses are incorporating their use at checkout. But as experience has shown, technological innovations create new vulnerabilities along with any opportunities. Learn how...

Is your security strategy keeping up?

Has your organization revisited its security strategy to ensure it is founded on the latest in experience, knowledge and security capabilities? Much like your best employees, successful cybercriminals are always evolving their skill...

Enhancing your enterprise security

Truly protecting your organization involves taking a holistic approach to blocking malicious activity. Machine learning with behavioral analysis and external and internal threat intelligence is providing a new, higher level of...

The rise and rise of Cybercrime as a Service

Cybercrime as a Service is growing, allowing about anyone with a criminal bent to steal your data. Illicit businesses offer on the dark web services that include ready-to-use DDoS botnets and ransomware software, and lists of phishing...

7 tips to secure against IoT cyberthreats

While some consider IoT to be in its infancy, the technology has already had a disruptive influence throughout the business world. But along the way to generating enormous opportunities for businesses, IoT technology has opened up new...

Cyberespionage: Your intellectual property under threat

Industrial espionage isn’t only a nation-state issue. Dodgy business rivals and cybercriminals with information to sell can pose serious risks to companies. Find out more about detecting and defending against the loss of your...

Are massive cyberattacks the new normal?

Massive cyberattacks that infect large numbers of machines with sometimes devastating effects are new. Are the 2016 Dyn DDoS attack and the May 2017 WannaCry ransomware attack harbingers of cybercrime’s future? And what can your...

Social media is a cybersecurity risk for business

Employees casually share a lot of personal information through social media – and bad actors are paying attention. Through phishing and other campaigns, cybercriminals are using personal information to worm their way into...

Your brand is under attack too

Bad actors not only want to steal your valuable data, they want to imitate your brand too. Learn how they operate and ways you can protect yourself and your customers from scams and offers of fake products.

10 tips for reducing your biggest cyberthreats

Zero-day attacks may generate the most press but they don’t represent the majority of breaches. Rather the biggest threat to organizations comes from known vulnerabilities that aren’t mitigated. Learn how to easily reduce your biggest...

Profile of a rogue insider cyberbreach

Rogue insider incidents can inflict major damage on an organization. Learn who, why and how these internal breaches happen and why focusing primarily on perimeter defenses won’t fully protect your organization.

Why IoT needs a security alliance

The Internet of Things has hundreds of protocols to address different aspects of the IoT ecosystem, but what’s lacking is a common set of guidelines or practices. In their absence, many IoT devices arrive in the market with security...

Is edge analytics the front line of cybersecurity?

The enormous amounts of data collected by enterprise can create security backlogs, slowing reaction times and increasing inefficiencies. Instead of waiting for data to be sent from a connected device to the centralized data center, a...

Ransomware spreads throughout healthcare

The healthcare industry faced around 90 percent of all ransomware attacks last year. Attracted by a number of issues factors ranging from the value of its data and the lack of strong cybercontrols industrywide, cybercriminals ensured...

What’s fueling cybersecurity concerns in the oil and gas industry?

Deployment of new technology in the oil and gas industry is outpacing current cybersecurity practices – with possible dire consequences for the nation’s economy. In fact, a recent survey found that around 70 percent of IT managers and...

Retail’s digital challenge hits home

Retailers have sluggishly adopted new security technology. But they have now become prime targets for cybercriminals. What can retailers can do to increase security for themselves and their customers?

CYOD or BYOD: A growing cybersecurity choice

Is CYOD (choose your own device) rather than BYOD (bring your own device) a better cybersecurity policy for your organization? Will greater control over the devices used by your employees provide the flexibility employees need and...

The rise of the botnet

Botnet attacks have been steadily growing since 2014. Their evolving prominence mirrors an uptick in the targeting of IoT devices used by corporations and consumers. Find out how an innovative cybersecurity strategy can aid in...

Protect your data against pervasive cyberattacks

The majority of cybercrimes don’t generate headlines. Rather social engineering schemes that target email to steal employees’ credentials are all too common. Other familiar applications, such as third-party cloud storage services, can...

Block cyberthreats with 4 innovative cybersecurity technologies

Innovation is not only key to business success – it is vital in protecting your valuable data. Cybersecurity innovation involves adapting and evolving your security strategy to protect data whether it is on your employees’...

Load More