What’s a Pop-Up SOC, and Who Needs One?
High-profile events across the globe are prime targets for hackers, which puts a huge security burden on an event’s host. Even if the host has secured the infrastructure for day-to-day operations, a large-scale attack needs to be locked down immediately, which requires a wide range of resources. It’s often the ... Read More
Can Smart Home Leaks Lead to Major Cyberattacks?
Smart speakers were everywhere this holiday season. According to a recent survey conducted by GetApp Lab, smart speakers were one of this year’s most wanted tech gifts. The new Echo Dot was the most purchased item on Amazon globally over the Thanksgiving weekend, which means that more and more kids are ... Read More
Education Sector Ranks Last in Total Cybersecurity Safety
Upon returning from the NICE K12 Cybersecurity Education conference in San Antonio earlier this month, I was energized by the passion and impressed with the vast collection of educators who are eager to learn about infusing cybersecurity into their classrooms. Then I read the “2018 Education Cybersecurity Report“ published by ... Read More
OSS Security a Top Priority in National Cyber Strategy
The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents. “The support and stability of the open-source software (OSS) ecosystem,” ranked third among the top six priorities identified ... Read More
Evaluating Risk Critical to Cloud Security
According to CloudAcademy’s “November 2018 Data Report,” the world is trending toward multi-cloud. In fact, multi-cloud environments have become such a reality that DevOps engineers are now expected to have concurrent proficiency in AWS and Microsoft Azure. What’s unclear, though, is how sensitive data is being protected in these multi-cloud ... Read More
5 Challenges Utilities Will Face in Preparing for New FERC Security Standards
Since the attack on the power grid in Ukraine, defending critical infrastructure against the threat of cyberattack has become a top priority. In an effort to strengthen supply chain risk management within the energy sector, the Federal Energy Regulatory Commission (FERC) approved new mandatory cybersecurity reliability standards from The North ... Read More
To BYOD or Not BYOD? Let Your Risk Decide
Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the old and in with the new, thus giving rise to the somewhat problematic enablement of BYOD programs. Considering ... Read More
E-Retailers: Stay Secure This (and Every) Holiday
‘Tis the season for labeling all things naughty and nice, especially when it comes to the retail sector. In anticipation of Black Friday and Cyber Monday, everyone wants to weigh in on how to avoid holiday shopping scams, but the reality is that no season poses greater cyber-risks than another ... Read More
User Experience: Achieving Performance and Security
Slow or inconsistent devices are the bane of a user’s existence. It’s understandable, as these types of experiences inhibit the user’s ability to be productive. But, a compromised user poses greater risks to the organization than a non-productive one, right? That’s the paradoxical battle security teams find themselves in as ... Read More
Adequacy Agreements, Legislation and Compliance in a GDPR World
While Capitol Hill is inundated with proposed privacy legislations from the Data Breach Prevention and Compensation Act (DBPCA), the CLOUD Act and the ENCRYPT Act, organizations the world over are trying to understand how to get their own regulations deemed adequate enough to ensure the flow of business in the ... Read More