On average, the United States Postal Service (USPS) handles over 493 million pieces of mail (letters and packages) per day. That number does not include the additional millions of packages per day handled by other shipping companies such as United Parcel Service or Fed-Ex. On an average day, all of this goes off without a […]
Our nation’s critical infrastructure is ubiquitous and it impacts almost every aspect of our day to day lives. The 16 sectors of critical infrastructure that work in unison to provide us with food, electricity, health care, and communication networks (among other things) are so baked into our daily activities, they’re easy to take for granted. […]
Discussions of cybersecurity (and physical security, for that matter) tend to focus on hardening networks and end points against outside threats. Too often, businesses overlook the internal threats they face. This infographic from Teramind, a cybersecurity company that focuses on insider threat detection, provides key steps to help prevent internal harm to your infrastructure.
Smart cybersecurity practices are more important now, as the lines between our public/private and work/home lives continue to blur. Therefore, it’s increasingly aware about your cyberhygiene, as you’re more likely to carry your bad habits (or good cybersecurity practices) as you transition from role to role. So, no matter where you work – whether it’s at […]
We’re right in the middle of National Cybersecurity Awareness Month, and the good folks at the National Cybersecurity Alliance would like to remind you that there are too few cybersecurity professionals in the workplace. This infographic provides a ton of useful information about the state of the workforce and outlines the broad array of opportunities […]
The modern, connected world has made a number of crimes easier to commit. Of these, extortion might have gotten the biggest boost. We’ve certainly seen the explosion in ransomware attacks over the last couple of years. While ransomware might be the exemplar of an extortion attack, any time a cybercriminal tries to get you or […]
Today, October 1, is the start of the 15th year of National Cybersecurity Awareness Month, a time when the Department of Homeland Security and the National Cyber Security Alliance work to bring awareness to the ever present issues regarding online safety. This year kicks off with a familiar, but very important theme: Making Your Home […]
As your organization’s dependence on technology grows, the role of the Chief Information Security Officer (CISO) is more important than ever. What does it take to work at the executive-level in cybersecurity? Varonis analyzed data from the CISOs of Fortune 100 companies to get a better sense of what skills these leaders possessed.
Hackers wear all varieties of hats. The best known are black hat hackers, who are out to sow cyber-discord in search of profit; and white hat hackers, who look for and report network vulnerabilities before malicious actors can find them. But what about red hat hackers? They are the professionals who specialize in penetration testing, […]
With ever increasing pressures from data protection laws such as the EU’s General Data Protection Regulation (GDPR), the looming California Consumer Privacy Act (CCPA), and the data breach laws active in all 50 states, businesses need to focus on baking security into their product design. To do this, many are turning to DevOps as a […]