Everyone is worried about internal cybersecurity threats, report

There are few things everyone can agree upon, but according to a new study almost all security professionals are concerned about insider threats. The study The Growing Security Threat From Insiders of 317 independently identified IT security professionals, from companies with more than 1,000 employees, conducted by Dimensional Research found 99.7 percent are concerned about internal […]

Ransomware attacks to ebb in 2017 – Intel Security

Ransomware attacks will decrease in volume and effectiveness in the second half of 2017, Intel Security predicts in its new McAfee Labs 2017 Threats Predictions report. The ransomware prediction is one of 14 threat trends Intel Security offered in the report, which concentrates on security issues it sees affecting the cloud and the Internet of Things […]

Data Breach Digest: How your company can respond to new threats in the New Year

Read Michael Bruemmer explain how businesses can respond to new threats in the New Year on Security Info Watch : Each year we see massive changes in the cybersecurity landscape, from new threats to new regulations. And every year Experian takes a step back to analyze what risks are most likely to take center stage in […]

5 ways data classification can prevent an education data breach

The explosion of data in the education sector can help institutions streamline and improve access to student and user records, as well as creating new efficiencies that reduce administrative tasks, while reaching more students with better and more targeted curriculum. Read/see the slideshow explaining how data classification can help prevent a education data breach on […]

Hacked in just six seconds: How criminals only need moments to guess card number and security code

Criminals can work out the card number, expiry date and security code for a Visa debit or credit card in as little as six seconds using guesswork, researchers have found. Experts from Newcastle University said it was “frighteningly easy” to do with a laptop and an internet connection. Read how security experts at Newcastle University could hack […]

Secure Your Phone Today Or Face A Data Breach Tomorrow

Read why it is important to keep your phone secure or risk a data breach on Above The Law : According to the ABA’s 2015 Legal Technology Survey Report, nearly 40 percent of lawyers in the U.S. use public Wi-Fi to access client data, but only 22 percent are using an encrypted connection. Clearly, mobile […]

10 ways to prepare enterprises for the Internet of Things

Read  Joe McKendrick list ten ways to prepare enterprises for Internet of Things security on ZDNet : Preparing an enterprise to embrace the Internet of Things means more than simply linking with remote devices or sensors. The IoT means rethinking an organization’s relationship with technology, and the possibilities that are opening up. These possibilities go […]

Data Breach Lawsuits Not Avoidable, But Reasonable Security Helps, Expert Says

David Willson, a retired Army officer, attorney and now owner of Titan Info Security Group, travels the country, educating CEOs and executives on how to protect their companies from data breaches, which have become increasingly common in recent years. Read why security experts say that though data breach lawsuits are not avoidable, companies should focus […]

Best practices for lowering cyber insurance costs and cyber risk

Read Jeff Erramouspe tell the effective ways in which your business can lower cyber insurance costs and cyber risks on Network World : With cybersecurity threats on the rise, companies are increasingly taking advantage of cybersecurity insurance. And while cyber insurance can be worth it, it’ll cost you. Last year, U.S. insurers earned $1B in […]

Open Source & Cloud Native: Why should Your Business Care?

Read Ken Owens explain the difference between open source and cloud native and how it affects your business on Cisco Blog : Over the last few years, several new companies disrupted established businesses from a software centric model. Some examples are Amazon, Netflix, Uber, and AirBnB. These companies were able to disrupt these industries by […]