The attack surface that security professionals must defend grows exponentially as more and more of our workplaces and processes are automated. This is especially true in industrial settings, where a host of machinery engages in a tightly coordinated dance, directed through instructions sent over wired or wireless networks. The price for a security breach is […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
The dark Web serves as a clearinghouse for much of the personal information, company data, and log-in credentials stolen through cyberattacks. However, these clandestine marketplaces are narrowly confined to those willing to engage in criminal behavior to get access to illicit data. Some cybercriminals appear to be branching out and are selling illegally obtained user […]
A data breach poses a severe threat to any company, whether it’s still developing or fairly established in the industry. Anyone can be the target of hackers—especially those companies who don’t take the necessary measures to protect their assets. Unfortunately, you can’t unscramble an egg: once a data breach happens, your company is compromised. However, […]
Thousands of employees that didn’t want to take their workplace problems to HR have turned to technology to air their grievances, like that provided by the anonymous social network Blind. Blind is an app-based platform that lets employees from the same company anonymously connect with co-workers to discuss problems at their workplace without fear of […]
One of the biggest news items of 2018 was the massive and still growing gap between organizations looking to hire skilled cybersecurity professionals and their overall dearth in the job market. This gap continues to expand in spite of the effort of corporations and governments around the world to steer people into cybersecurity careers. Recruitment […]
As 2018 creeps to a close, its time for thought leaders of all stripes to start prognosticating about what the cybersecurity landscape will be in the coming year. It’s a tall order, as this past year brought some complete surprises, including speculative execution vulnerabilities, the rise of cryptomining, the ransomware attack on the city of […]
Let’s begin by imagining a normal day at work. It’s likely that you are using the internet to share important data across your team and with your clients. In the middle of your workflow you get a push notification prompting you to update your computer’s software. You’re busy so you elect to do it later, […]
Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.
Kubernetes has picked up a great deal of steam over the past couple of years, easily becoming one of, if not the most popular cloud container organization system. And, as security-minded folks have seen time and again, when a software solution gains ground in the marketplace its vulnerabilities start to bubble to the surface. While […]
Technology has always played an important role in the day-to-day duties of first responders, and now even more so, with the growing adoption of the Nationwide Public Safety Broadband Network (NPSBN). The network was built to facilitate faster, clearer communication between first responders from all departments, so that everyone heading to the site of an […]