Industry Spotlight

Securing the Network

5 Ways to Secure the Digital Core of Your Business

The infrastructure that keeps your business running is similar to the ropes, pulleys and sets behind the scenes of a stage play. These mechanisms must be in good working order and actions must happen on cue to create a seamless experience for the audience. Your infrastructure, the digital core of ... Read More
Data Breach Under GDPR

How to Prepare for a Data Breach Under GDPR

| | Cyberlaw, GDPR, Privacy
The European Union’s General Data Protection Regulation (GDPR) came into effect last month with a mighty thud. This wide-ranging law requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within the European Union. GDPR applies to all companies operating in Europe and all ... Read More
Next Generation of Cybersecurity Talent

Top 4 Ways to Find the Next Generation of Cybersecurity Talent

The talent shortage in cybersecurity is a well-known and well-discussed problem. There are more jobs in cybersecurity than there are qualified employees to fill them. This problem is compounded by the fact that many current cybersecurity positions require hands-on experience, leading many organizations to compete for seasoned security professionals rather ... Read More
The Kill Chain Model

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command and Control. Actions on Objective. Sound familiar? The goal of cyberteams is to detect bad ... Read More
Microsoft Age of Collaboration

Microsoft and the Age of Collaboration: Now, We Stand

Thank you, Microsoft. When teaching about computer security, I’ve often quipped, “There is ‘Infosec,’ ‘Comsec’ and ‘Jobsec.’”  Thanks to the ubiquitous Windows platform, fraught with security holes that were found on what felt like a weekly basis. Patch Tuesday was “celebrated” almost as much as Friday nights (not really). But ... Read More
Mobile Fitness App Vulnerabilities

How Healthy Is Your Mobile Fitness App? 7 Common Security Vulnerabilities

Ironman triathlete or couch potato, there’s a mobile fitness app that promises to help you reach your health and fitness goals. Running with a buddy is great, but running with a fitness app is the preference of approximately 260 million consumers in 2018. However, by tracking and collecting some of ... Read More
Departing Employees Taking Data

Are Departing Employees Taking Your Data with Them?

The offboarding process is seemingly straightforward: departing employees return all company property, including laptop, mobile device and building access card. However, they could be walking out the door with something far more valuable: your data. And without the proper precautions in place, you won’t know until it’s too late. Because ... Read More
Mobile Devices for GDPR Compliance

Organizations Are Overlooking Mobile Devices for GDPR Compliance

The dawn of the European Union General Data Protection Regulation (GDPR) is upon us, but organizations are overlooking the risk of mobile devices. The cost for non-compliance is steep. For example, if the Equifax breach occurred under GDPR, it is estimated that its fine would have been more than $120 ... Read More
Protecting Your Privileged User Accounts

Protecting Your Privileged User Accounts

Not keeping privileged user accounts secure is equal to handing over the keys to the kingdom A thief is planning to rob a museum’s visiting jewelry exhibit. He or she could acquire the blueprints for the museum and plan an escape route, hack into the museum’s network and disable the ... Read More
SSH Management for Stronger Security

Bringing Sanity and Clarity to SSH Management for Stronger Security

Poor to no visibility is a dangerous scenario for enterprise and government IT executives today. In trying to manage their digital infrastructure, they often are faced with one question: Which functional group within IT should be responsible for SSH management? The reason this lack of visibility is such a struggle ... Read More
Loading...