Why diversity of thought matters in cybersecurity

Introduction The cybersecurity industry has long struggled with gender disparity. And while the number of women in cybersecurity is growing, the gap remains, just as the industry as a whole is facing... Go on to the site to read the full article ... Read More

Saving lives with ICS and critical infrastructure security

Introduction Digital transformation has revolutionized critical infrastructure industries like manufacturing, enabling them to harness new technologies such as the cloud and the Internet of Things to... Go on to the site to read the full article ... Read More

The difference between AI and machine learning

Introduction Some people use the terms “artificial intelligence” and “machine learning” interchangeably, but they’re not the same thing. To put it simply, artificial intelligence is a broad computer... Go on to the site to read the full article ... Read More

Which states have the toughest privacy laws?

Introduction Despite its high-tech advances, the United States lags behind other developed countries in protecting consumer privacy. Unlike most other developed countries, the United States only has... Go on to the site to read the full article ... Read More

What you need to know to avoid becoming a phishing scheme victim

| | Phishing
Introduction A Lithuanian man is facing up to 30 years in prison this July for his role in a phishing scheme involving Facebook and Google. In March, he pled guilty to helping fleece the two... Go on to the site to read the full article ... Read More

5 soft skills you need to be a successful security pro

Introduction The pace of new cybersecurity professionals entering the field is not keeping up with the demand, and the talent gap has been growing wider in the last few years. Considering the dire... Go on to the site to read the full article ... Read More

As the connectivity of trucking fleets grows, so do cybersecurity risks

Connectivity is changing commercial truck fleet operations. While the development of autonomous heavy vehicles is still in early stages, fleet owners have been increasingly relying on “connected”... Go on to the site to read the full article ... Read More

Consumer beware: Protect your privacy when installing new apps

Facebook got into hot water recently after two separate discoveries that it grossly violated privacy through the data-collection practices of its mobile app. First, TechCrunch found that Facebook... Go on to the site to read the full article ... Read More

HCISPP or CISSP? What’s the Difference and Which Is Best for You?

The healthcare industry is struggling to keep up with cybersecurity threats, which by now have become commonplace. According to the HIPAA Journal, over the last decade, the number of breaches has... Go on to the site to read the full article ... Read More

Assessing Your Organization’s Cybersecurity Practices with Homeland Security’s Cyber Resilience Review

Every time a new high-profile data breach makes the news, it’s another reminder to organizations about the need to be vigilant. With the estimated cost per lost or stolen record at $148 (according to... Go on to the site to read the full article ... Read More
Loading...