NetSecOPEN names founding members, appoints inaugural board of directors

NetSecOPEN names founding members, appoints inaugural board of directors

SAN JOSE, Calif. – Dec. 11, 2018 – NetSecOPEN, the first industry organization focused on the creation of open, transparent network security performance testing standards, today announced that 11 prominent security vendors, ...
New Sextortion Scam Campaign Delivering GandCrab Ransomware

New Sextortion Scam Campaign Delivering GandCrab Ransomware

Digital criminals have launched a new sextortion campaign that attempts to infect users’ computers with a version of GandCrab ransomware. On 5 December, researchers at Proofpoint observed a scam operation spewing out ...
10 Proven Security Awareness Tips From Osterman Research — CyberSpeak Podcast

10 Proven Security Awareness Tips From Osterman Research — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Michael Osterman, president and analyst at Osterman Research, shares security awareness tips and strategies that organizations can... Go on to the site ...
GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

GUEST ESSAY: ‘Tis the season — to take proactive measures to improve data governance

The holiday season is upon us and the bright lights and greenery aren’t the only indicators that we’ve reached December. Sadly, data breaches often occur at this time of year. Recently we’ve ...
Hackathon Uses Machine Learning to Improve Cybersecurity

Hackathon Uses Machine Learning to Improve Cybersecurity

Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a ...

10 Steps to Recover from a Hacked Website

A website getting hacked isn’t really news today; it has become an almost common thing. So, what should you do if your website is hacked? How can you work on recovering things ...
GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The United States Intelligence Community, or IC, is a federation of 16 separate U.S. intelligence agencies, plus a 17th administrative office. The IC gathers, stores and processes large amounts of data, from ...

What Cyberstalking Is and How to Prevent It

When carried out sensibly and securely, communication through social networks and other online public forums can be beneficial, both socially and professionally. However, if you’re not careful, it can lead to numerous ...
I Am Alexa, and I Am Here to Help: Simple Tweaks to Help Reduce Risk from Voice-Controlled Devices

I Am Alexa, and I Am Here to Help: Simple Tweaks to Help Reduce Risk from Voice-Controlled Devices

Over the last few years, smart devices – once a rare novelty for only the elite and early-adopters – have become a common household item, partly in thanks to Amazon’s economical Alexa-powered ...
GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

GUEST ESSAY: Atrium Health data breach highlights lingering third-party exposures

The healthcare industry has poured vast resources into cybersecurity since 2015, when a surge of major breaches began. While the nature of these breaches has evolved over the last four years, the ...
Loading...