How to Integrate Cybersecurity with Digital Transformation

How to Integrate Cybersecurity with Digital Transformation

/ / News and Views
Digital transformation has been taking place in several organizations around the world. In fact, according to the 2018 State of Digital Business Transformation survey by IDC (International Data Corporation), approximately 37% of organizations have already started integrating and executing a digital-first approach, and 7% say they are already an enterprise-wide ... Read More
The Importance of Cybersecurity in Digital Transformation

The Importance of Cybersecurity in Digital Transformation

/ / News and Views
As of December 31, 2017, there were 4,156,932,140 internet users around the world. That is approximately 54.4% of the world population (7,634,758,428) at the time. Basically, every person who can afford to have an internet connection and electronic devices, do almost everything online. It is no surprise, therefore, that organizations ... Read More
Hackers Have Gone Automated  – So Should Your Cybersecurity Defense

Hackers Have Gone Automated – So Should Your Cybersecurity Defense

/ / News and Views
Recently, a study, conducted by security firm Cybereason, revealed that cybercriminals are now using automation to do their crime. A fake server known as a honeypot was used to log everything done to it by hackers. When it was put online, it was quickly found and hijacked in a matter ... Read More
The GDPR and its Benefits to Your Organization

The GDPR and its Benefits to Your Organization

/ / News and Views
Source: Convert GDPR May 25 is just around the corner. Are you GDPR-compliant yet? The General Data Protection Regulation (GDPR) brings more protection for EU citizens’ personal data. This is clearly something that EU citizens are looking forward to but for many business owners, the GDPR’s imminent arrival is quite ... Read More
What is GDPR? Why is it Important for Business?

What is GDPR? Why is it Important for Business?

/ / News and Views
Source: “Convert GDPR” According to a report by PwC, cybercrime was the second most reported crime in 2016. In addition, the National Crime Agency reports that cybercrime now accounts for more than 50% of all crimes in the UK. Unfortunately, it takes 146 days for security experts to detect that ... Read More

SpyCloud Secures $5 Million in Funding to Eradicate Account Takeover

/
Company solidifies plans for growth as ATO prevention becomes an enterprise necessity AUSTIN, Texas – March 28, 2018 – SpyCloud, the leader in account takeover (ATO) prevention, announced today it has closed a $5 million Series A funding round from existing investors Silverton Partners and March Capital Partners. SpyCloud prevents ATO from ... Read More
Security Boulevard
Improved Cybersecurity Measures for Better Organizations

Improved Cybersecurity Measures for Better Organizations

Important Statistics on Cybersecurity Cyberattacks targeting businesses almost doubled from 82,000 in 2016 to 159,700 in 2017. Additionally, seven billion records were exposed in the first three quarters of 2017 and the FBI reports that global BEC ((Business Email Compromise) losses amounted to $5.3 billion USD. According to the 2017 ... Read More
Why Unpatched Systems are a Security Risk

Why Unpatched Systems are a Security Risk

Malicious exploits continue to plague unprotected systems. Here are some recent cases. On January 31, 2018, Kr-Cert, a South Korean Computer Emergency Response Team, spotted an Adobe Flash Player zero-day (CVE-2018-4878) in the wild. According to a report by McAfee, the exploit has been used in targeted attacks. It arrives ... Read More
Cybersecurity Evolution and its Importance in the Digital Age

Cybersecurity Evolution and its Importance in the Digital Age

The Start of Cybersecurity In the early seventies, Robert (Bob) Thomas was a researcher for BBN Technologies in Cambridge, Massachusetts. Thomas realized that a computer program can move across a network leaving a small trail wherever it went. So, he created the first computer “worm” which he named Creeper. It ... Read More

Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program

/
WhiteHat Security announced today that academic institution Virginia Commonwealth University (VCU), has selected WhiteHat Security to keep its complex ecosystem of mission-critical applications secure. VCU has chosen the WhiteHat Sentinel Source static application security testing (SAST) solution to ensure security is addressed early in the software development lifecycle (SDLC); and the WhiteHat Sentinel Dynamic solution ... Read More
Security Boulevard
Loading...