What Is It Like to Be a Penetration Tester for an In-House Team?

What Is It Like to Be a Penetration Tester for an In-House Team?

Being a penetration tester is an exciting and lucrative career, but is it the right one for you? You may be reading this article because you: Are interested in becoming a penetration tester Are... Go on to the site to read the full article ... Read More

How to Protect User Data with the Privacy by Design Framework

The Privacy by Design framework (PbD) was first introduced by Dr Ann Cavoukian, Information and Privacy Commissioner of Ontario, in the 1990s. PbD “… advances the view that the future of privacy... Go on to the site to read the full article ... Read More

How to Safeguard Against the Privacy Implications of Cloud Computing

Introduction The definition of cloud computing is quite controversial but the general consensus, good enough for our purposes, is that it is really just a metaphor for the Internet and refers to the... Go on to the site to read the full article ... Read More

Top 10 Privacy Protection Tools for the Enterprise

Introduction As technology evolves and Internet-connected smart devices become more and more common, many new privacy regulations are being enacted to protect us. One such is the GDPR, or General... Go on to the site to read the full article ... Read More

Fraud as a Service (FaaS): Everything You Need to Know

Introduction The 2017 LexisNexis® True Cost of Fraud report makes for sobering reading. After surveying nearly 1,200 risk and fraud executives, the report concluded that fraud in retail, commerce,... Go on to the site to read the full article ... Read More

Spam vs. Phishing: Definitions, Overview & Examples

Introduction Spam is usually defined as unsolicited commercial e-mail, often from someone trying to sell something. Spammers are not generally trying to get sensitive information from you, although... Go on to the site to read the full article ... Read More

5 Benefits of Paying for an Employee’s Professional Certification

Introduction There are many reasons an employee may want professional certification: personal sense of achievement, an increase in salary or status, promotion, or specialized expertise with a view to... Go on to the site to read the full article ... Read More
A Cyber Insurance Policy Checklist

A Cyber Insurance Policy Checklist

Use this checklist to help you purchase the best cyber insurance policy for your company. Step 1. Determine If You Need Cyber Insurance. Things to consider include: Your company handles sensitive... Go on to the site to read the full article ... Read More
How Security Awareness Training Can Protect Law Enforcement

How Security Awareness Training Can Protect Law Enforcement

Why Does the Law Enforcement Industry Need Security Awareness? Law enforcement is not immune to cyber attacks. In fact, the sector faces multiple threats. How bad is it? We don’t know, and if we did,... Go on to the site to read the full article ... Read More
Security Awareness: 7 Tips for Training Field Technicians

Security Awareness: 7 Tips for Training Field Technicians

Supervisory Control and Data Acquisition (SCADA) is a system of software and hardware elements that allow industrial and governmental organizations to gather data in real time from mission-critical... Go on to the site to read the full article ... Read More
Loading...