Cyber Security Hot Topics

6 Top Cybersecurity Conferences to Attend and Top Tips to Survive Travel in 2022
Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept ...

7 Steps to Recognize and Combat Cyber Crime
Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many ...

2022 Cyber Predictions: Ransomware, Hacking eSports, and COVID Cleanup
In many ways, 2021 felt like an extra dose of 2020. Bright spots like COVID vaccines aside, most of us simply put our heads down and plowed ahead as the hits just ...

An Ethical Hackers Guide to IoT Security Risks and Challenges: Part 2
This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges ...

An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 1
Welcome to the world of IoT (Internet of Things). More devices get connected online every minute, with more than 9-billion devices performing all sorts of tasks and automation. Every day, employees power ...

Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report
A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that ...

Ransomware Mitigation: Where Do We Go From Here?
Following recent headlines surrounding cyber security, it’s reasonable to conclude that ransomware has rapidly become one of the biggest global threats our businesses and institutions face today. These attacks—which infiltrate our networks, lock ...

Zero Trust for ICS/SCADA Systems
Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These ...

Give Your Cyber Security Career a Boost
While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe ...
Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person
It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person ...