It’s no secret that the volume, sophistication, and consequences of cyber attacks have escalated dramatically in recent years. That trend has organizations scrambling to tighten up the security of the software applications they’re...
With the proliferation of millions of poorly secured IoT devices, these attackers also have a ready and growing source of “fuel” to power massive botnets and generate crippling volumes of requests.
What’s Next for Cybersecurity in 2018?
By Dwight Davis
Is it possible to anticipate what the coming year will bring us – pro and con – on the cybersecurity front? Making precise predictions about one of the most dynamic sectors...
In the shadowy world of cybersecurity, obvious and indisputable threats are more the exception than the rule. If that weren’t the case, it would be a lot simpler to identify and counter malicious actors, traffic, and websites.
Cybersecurity Budgets Across the Globe
By Dwight Davis
According to a recent AT&T-sponsored survey, the type and amount of your cybersecurity investments may be significantly influenced by the region in which your organization...
Do Dangerous Gaps Exist in Your Cybersecurity Investments?
By Dwight Davis
Are there any companies today that don’t take cyberthreats seriously? Maybe a handful, but they are outliers in a world in which cybersecurity has become a...
Talk to any cybersecurity professional, and it won’t be long before you hear the word “layered approach.” The variety of cyber threats today – as well as the vulnerabilities they target – are so diverse that organizations can only...
How Overconfidence Can Lead to Lax Cybersecurity
By Dwight Davis
Do you have confidence that your in-house security personnel has the knowledge, experience and technology to defend against cyberattacks? If so, there’s a chance...