Ryan Francis

Contributor

Ryan Francis has been in the tech publishing field for 17 years.

Buying fraud right off the virtual rack

Buying fraud right off the virtual rack

Report finds fraud running rampant, especially in the retail sector.

9 questions to ask when selecting application security solutions

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

Healthcare records for sale on Dark Web

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

What's in the fine print of your disaster recovery vendor agreement?

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

10 interview questions for hiring cloud-literate security staff

10 interview questions for hiring cloud-literate security staff

The answers will paint a picture of whether this candidate understands cloud security.

Social engineering scam targets Indian call center

Social engineering scam targets Indian call center

Call centers in foreign countries can be at times ripe for social engineering. Most operators are supposed to stick to a script. Find out what happened when the operator left that script.

10 ways Trusted Identities are used

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

Cybersecurity companies to watch

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

How to prevent your mobile app from getting hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

The 7 worst automation failures

The 7 worst automation failures

A list of the moments when technology monumentally backfired.

How CISOs can explain privacy to the C-suite

How CISOs can explain privacy to the C-suite

With the recent moves by the FCC, it is imperative that chief security officers make the company aware of privacy issues.

Detecting insider threats is easier than you think

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls.

Why you should study security in college

Why you should study security in college

An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college.

Top 10 ways to achieve agile security

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

What enterprises can learn in the aftermath of a phishing attack

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn...

What home products are most susceptible to cyber burglars?

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at...

5 ways data classification can prevent an insurance data breach

5 ways data classification can prevent an insurance data breach

Spirion CEO Todd Feinman offers examples of how insurance firms can leverage data classification to reduce the risk of data theft and costly compliance violations.

Email security appears grounded as attacks continue to take flight

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

Top 5 email security best practices to prevent malware distribution

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

Load More