For strong unified communications security, behavioral analytics is critical

Read why says that for businesses to develop strong unified communications security, they must have a behavioral analytics policy in place on Help Net Security : If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding that team – it’s that […]

Data breaches wouldn’t be a big deal if we prepared better for the inevitable

Read Paul Muschick’s article about how companies can prepare themselves for inevitable data breach on The Morning Call : It’s time to get over the Equifax data breach. That sounds strange coming from the Watchdog, but hear me out. While there’s no excuse for the bone-headed security breakdown at Equifax that potentially exposed 145 million Americans’ most-sensitive […]

In 2018, IoT will move beyond experimentation

The term IoT can be confusing, and depending on who you talk to they might choose to focus on one element like connectivity or another. At Forrester we believe IoT extends beyond devices and connectivity. Read Forrester’s predictions for Internet of Things for 2018 on ZDNet.

The Ransomware Threat: Three Steps to Stay Safe

Read Michael Fimin explain how companies can avoid ransomware threats on Information Security Buzz : According to the Verizon 2017 Data Breach Investigations Report (DBIR), ransomware was the top malware variant in Crimeware category in 2016. That trend is likely to hold this year. Read his full article here.

How can a hypervisor deployment avoid security risks?

Read Judith Myerson explain how hypervisor deployment can help companies security risks on Tech Target : The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). Read her full article […]

Healthcare organisations are ramping up investments in cyber security, says Infoblox

In a country where 26% of healthcare organisations are willing to pay ransom to hackers and 23% of IT professionals are not confident in their organisation’s ability to respond to a cyber-attack, one may deduce that the healthcare sector is virtually losing the battle against cyber criminals. Read about the new report by Infoblox which […]

5 Ways To Improve Your Small Business Cybersecurity

Read Mike Kappel list five ways in which small and medium businesses can improve their cyber security on Forbes : Do you think your small business is at risk of being hacked? An overwhelming 87% of small business owners don’t think so. But, your business might be at risk more than you realize. About half of […]

Cyber and physical security are inseparable

Read why Beverley Head says that cyber and physical security are inseparable on Computer Weekly : A comprehensive approach that brings together analyses of people, places and patterns might be the best hope for establishing secure environments – both online and in the physical world. Read her full article here.

Who’s really responsible for cloud security?

Read Colby Proffitt’s article about who should be responsible for cloud security on GCN : It’s been seven years since the Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress. While the cloud brings benefits, security remains a […]

IoT’s biggest threat: Systemic security flaws

Read why David Rolfe says that the systemic security flaws are biggest threat to Internet of Things on Tech Target : Nearly every week, we read another story related to an IoT security breach or hack. For now, the vast majority of these are individual failures by vendors, but organizations are facing an existential risk […]