GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to ...
GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical ...
GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

Cyberattacks are becoming more prevalent, and their effects are becoming more disastrous. To help mitigate the risk of financial losses, more companies are turning to cyber insurance. Related: Bots attack business logic ...
GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection ...
GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other notable security ...
GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can’t take it for granted: data ...
GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business

GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business

In the last year, the news media has been full of stories about vicious cyber breaches on municipal governments. From Atlanta to Baltimore to school districts in Louisiana, cyber criminals have launched ...
GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a ...
GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

There’s oil in the state of Maryland – “cyber oil.” With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line ...
GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data, which sooner or later can be traced back to you. Related: ...