GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can’t take it for granted: data ...
GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business

GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business

In the last year, the news media has been full of stories about vicious cyber breaches on municipal governments. From Atlanta to Baltimore to school districts in Louisiana, cyber criminals have launched ...
GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a ...
GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

There’s oil in the state of Maryland – “cyber oil.” With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line ...
GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data, which sooner or later can be traced back to you. Related: ...
BEST PRACTICES: 6 physical security measures every company needs

BEST PRACTICES: 6 physical security measures every company needs

It has never been more important to invest in proper security for your business. Laws surrounding the personal data of individuals such as the General Data Protection Regulation (GDPR) put the onus ...
GUEST ESSAY: Repelling social engineering attacks requires shoring up the weakest link: humans

GUEST ESSAY: Repelling social engineering attacks requires shoring up the weakest link: humans

| | Guest Blog Post, Top Stories
The problem with social engineering attacks is that they capitalize on the weakest link on any computer or network system: You! Avoiding social engineering attacks requires you to understand what they are ...
GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at ...
GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

GUEST POST: Six tangible ways ‘SOAR’ can help narrow the cybersecurity skills gap

The cybersecurity talent shortage is here to stay. With an estimated 1.5-2 million unfulfilled cybersecurity positions, organizations are coming to terms with the fact that no amount of creative hiring initiatives will ...
GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise ...
Loading...