GUEST ESSAY:  5 steps for raising cyber smart children — who know how to guard their privacy

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects ...
GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

One legacy of the ongoing global pandemic is that companies now realize that a secured and well-supported remote workforce is possible. Recently, the University of Illinois and the Harvard Business School conducted ...
GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks.Related: Welcome to the CyberXchange MarketplaceIn the U.S. alone, in ...
GUEST ESSAY: Skeptical about buying life insurance online? Here’s how to do it — securely

GUEST ESSAY: Skeptical about buying life insurance online? Here’s how to do it — securely

Purchasing life insurance once meant going to an insurer’s office or booking an appointment with an insurance agent. Then, in most cases, you’d have to undergo a medical examination and wait a ...
GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to ...
GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical ...
GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

Cyberattacks are becoming more prevalent, and their effects are becoming more disastrous. To help mitigate the risk of financial losses, more companies are turning to cyber insurance. Related: Bots attack business logic ...
GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection ...
GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other notable security ...
GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can’t take it for granted: data ...