Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

Login screen on laptop

Now is a Good Time to Remind Your Organization About Password Security

While there is a general awareness among most people about using secure passwords, an individual’s overall concern about data security consistently runs into the need to remember a growing number of unique passwords for an ever-larger number of accounts. Add the demands for complexity, differing password constraints for each service, and the need to frequently […]

Man and robotic machine work together inside industrial building. The mechanical arm performs welds on metal components assisted by a worker who in turn manages welds manually.

Researchers Find Security Risks Relating to Industrial Machinery

The attack surface that security professionals must defend grows exponentially as more and more of our workplaces and processes are automated. This is especially true in industrial settings, where a host of machinery engages in a tightly coordinated dance, directed through instructions sent over wired or wireless networks. The price for a security breach is […]

Deploying Wireless Backhaul Links for Security: It’s Easier Than You Might Think

With the cost of IP-based surveillance cameras, access controllers, and other security devices continuing to fall, there is a lot of interest in deploying such equipment pervasively. The challenge in such applications, however, is wiring. Often, cameras and other devices need to be placed in areas where electrical power is readily available, but network connectivity […]

Busy office with workers at computers

Cybercriminals Selling Stolen Windows Credentials on eBay

The dark Web serves as a clearinghouse for much of the personal information, company data, and log-in credentials stolen through cyberattacks. However, these clandestine marketplaces are narrowly confined to those willing to engage in criminal behavior to get access to illicit data. Some cybercriminals appear to be branching out and are selling illegally obtained user […]

Data Breach

Three Things You Should Know If Your Organization Suffers a Data Breach

A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]

Exposed data concept

Researcher Finds Anonymous Social Network Blind Leaking Data

Thousands of employees that didn’t want to take their workplace problems to HR have turned to technology to air their grievances, like that provided by the anonymous social network Blind. Blind is an app-based platform that lets employees from the same company anonymously connect with co-workers to discuss problems at their workplace without fear of […]

Concept of cybersecurity professional

Need for Skilled Cybersecurity Professionals Isn’t Going Away in 2019

One of the biggest news items of 2018 was the massive and still growing gap between organizations looking to hire skilled cybersecurity professionals and their overall dearth in the job market. This gap continues to expand in spite of the effort of corporations and governments around the world to steer people into cybersecurity careers. Recruitment […]

Hackers coding virus using laptops.

Peering Into the Cybersecurity Crystal Ball

As 2018 creeps to a close, its time for thought leaders of all stripes to start prognosticating about what the cybersecurity landscape will be in the coming year. It’s a tall order, as this past year brought some complete surprises, including speculative execution vulnerabilities, the rise of cryptomining, the ransomware attack on the city of […]

Tablet connected to VPN on office desk

Use a VPN to Stay Anonymous Online

Let’s begin by imagining a normal day at work. It’s likely that you are using the internet to share important data across your team and with your clients. In the middle of your workflow you get a push notification prompting you to update your computer’s software. You’re busy so you elect to do it later, […]

BYOD

Adapt BYOD Policy to Account for Tech and Culture Change

Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.