Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

AMD Processors Contain Serious Vulnerabilities

On the heels of the Meltdown and Spectre vulnerabilities that affected Intel processors, a security research firm has released a report detailing exploits they’ve uncovered in AMD processors. The controversial report, produced by CTS Labs, a cybersecurity consultancy firm, alleges that 13 vulnerabilities exist in the AMD Platform Security Processor (PSP), used in the company’s […]


Adapt BYOD Policy to Account for Tech and Culture Change

Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.


Tips to Improve Your Cybersecurity Posture

It may be hard to believe, but according to a new report barely over one-half (just 56%) of companies have an overall information security strategy. Given the huge importance of data security, it’s important that companies be prepared—here are a few things to consider.


How IT Security Audits Benefit Your Business Process

In the IT industry, engineers and specialists are constantly bracing themselves against a security breach on their system. Any situation of this sort may result in data loss and operations shutting down. These are very serious problems that no enterprise can afford because they can cause irreparable damage to a company’s financial resources, business competitiveness, […]


BlackBerry Begins Licensing Its Security Technology

You probably won’t be getting a BlackBerry for your next device, but its software may be on your next phone. As the company’s strategy has shifted, BlackBerry is now licensing its security technology to third-party phones and other smart devices.


Social Engineering Means Cybersecurity Depends on Human Resources

Some believe that our increasing reliance on technology has lessened the importance of humans in today’s workplace, but just the opposite is true. Although technology can help us work more efficiently, humans remain the central motor that drives all endeavors forward. This means human resources (HR) must play a role in cybersecurity.

Computer developer

New Microsoft Driver Security Guidance Released

At the end of February, Microsoft unveiled its new Driver Security Guidance for Windows driver developers. The guidance is designed to help developers avoid or prevent the issues associated with a driver being attacked.


How Cloud Adoption Is Shaping IT Security Strategies

As people become more dependent on computers and mobile devices for their personal and professional tasks, the risks associated with these technologies also increase. In the workplace alone, threats such as ransomware and malware, among others, can affect monumental results.


European Water Utility Hit by Hackers

Water utility networks and control systems were recently targeted by hackers in Europe, highlighting the growing cybersecurity threat to infrastructure. The attack was of particular interest because the culprit was somewhat unusual—cryptocurrency mining software.

Cybersecurity management

New Cybersecurity Task Force Announced

U.S. Attorney General (AG) Jeff Sessions recently announced the formation of a new cybersecurity task force under the U.S. Department of Justice. The Cyber-Digital Task Force will combat global cyberthreats and identify how federal law enforcement can more effectively accomplish this mission.