While there is a general awareness among most people about using secure passwords, an individual’s overall concern about data security consistently runs into the need to remember a growing number of unique passwords for an ever-larger number of accounts. Add the demands for complexity, differing password constraints for each service, and the need to frequently […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
The attack surface that security professionals must defend grows exponentially as more and more of our workplaces and processes are automated. This is especially true in industrial settings, where a host of machinery engages in a tightly coordinated dance, directed through instructions sent over wired or wireless networks. The price for a security breach is […]
With the cost of IP-based surveillance cameras, access controllers, and other security devices continuing to fall, there is a lot of interest in deploying such equipment pervasively. The challenge in such applications, however, is wiring. Often, cameras and other devices need to be placed in areas where electrical power is readily available, but network connectivity […]
The dark Web serves as a clearinghouse for much of the personal information, company data, and log-in credentials stolen through cyberattacks. However, these clandestine marketplaces are narrowly confined to those willing to engage in criminal behavior to get access to illicit data. Some cybercriminals appear to be branching out and are selling illegally obtained user […]
A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]
Thousands of employees that didn’t want to take their workplace problems to HR have turned to technology to air their grievances, like that provided by the anonymous social network Blind. Blind is an app-based platform that lets employees from the same company anonymously connect with co-workers to discuss problems at their workplace without fear of […]
One of the biggest news items of 2018 was the massive and still growing gap between organizations looking to hire skilled cybersecurity professionals and their overall dearth in the job market. This gap continues to expand in spite of the effort of corporations and governments around the world to steer people into cybersecurity careers. Recruitment […]
As 2018 creeps to a close, its time for thought leaders of all stripes to start prognosticating about what the cybersecurity landscape will be in the coming year. It’s a tall order, as this past year brought some complete surprises, including speculative execution vulnerabilities, the rise of cryptomining, the ransomware attack on the city of […]
Let’s begin by imagining a normal day at work. It’s likely that you are using the internet to share important data across your team and with your clients. In the middle of your workflow you get a push notification prompting you to update your computer’s software. You’re busy so you elect to do it later, […]
Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.