Technology Industry

Technology Industry news, information, and how-to advice

shadows of team figures collaborating, each holding up gears that work together
blind spot side view mirror car vehicle

11 victims

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

5 fumbling dumb mistake

Dear IT security pros: it's time to stop making preventable mistakes

Examining commonalities: shared strategies or mistakes across multiple cybersecurity incidents.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

cloud security ts

How machine learning is shaping the next generation of cloud security

Security solutions must pivot in order to protect organizations as they move to the cloud.

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

vulnerable gdpr breach security cyber attack

CISOs: What you can control – and what you can’t – in GDPR

80% of GDPR is out of the CISO’s control...

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

cloud computing shared public cloud

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

keys to access solutions rubic cube puzzle

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

hearts

7 ways to stay safe online on Valentine’s Day

Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet.

businessmen with umbrellas risk protected storm

How do I BRI?

Regardless of the threats, risks and security challenges a business may face, it’s crucial to recognize that having the right approach to intelligence has truly become a requirement.

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

alert hacking threat detected

How to automate threat hunting

The quest for hidden threats...

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

data search money currency solution uncertainty escape leave

If time is money, what exactly is data?

If you consider how much your data is worth to various parties and in varied contexts, then you’ll be in a better position to understand both its value and the extent to which it needs to be protected.

Load More