The Internet of Thieves? Why IoT urgently needs to be secured

Read why Matthias Schorer says that Internet of Things security needs to addressed immediately on Dataquest : For those who are interested in the Internet of Things (IoT) and IT security, I recommend an insightful article from Fortune magazine, titled “Who to Blame for the Attack on the Internet.” The author, Jeff John Roberts, describes […]

The Time Has Arrived to Embrace Hackers

Read why Michael Mimoso says that it is time to embrace the hackers on Threat Post : More than ever, hackers are getting a welcoming embrace from law enforcement, governments and business. Bug bounties and vulnerability disclosure programs are becoming the norm across industry, and hackers are no longer universally viewed as a pariah. Read his full […]

New Mexico Becomes 48th State to Enact Data Breach Statute

Recently the state of New Mexico enacted the Data Breach Notification Act, making it the 48th state in the United States to enact a statute requiring notice to individuals impacted by a data breach. In doing so, New Mexico follows some trends we’ve been predicting at the state level. Read about the newly notified data […]

The Health Care Data Breach: A Tale of Big Expenses and Cheap Sales

Read Douglas Bonderud take a look at the growing cases of healthcare sector data breaches on Security Intelligence : Health care data breaches are on the rise. As noted by MedPage Today, there were 39 reported health network compromises in March, totaling more than 1.5 million records. This not only surpasses the 31 total events reported […]

Public and private partnerships help fortify critical infrastructure

Building public and private partnerships is imperative to protecting a country’s critical infrastructure, according to Steven Gutkin, deputy director at the New Jersey Office of Homeland Security and Preparedness. Gutkin spoke with SearchCIO at the recent Fusion CEO-CIO Symposium, produced by WTN Media. Read the interview with Steven Gutkin, deputy director at the New Jersey Office […]

Cybersecurity Risk Is Real: SSI’s 2017 Physical-Logical Security Assessment

Hard as it may be for some to believe in 2017, the electronic security profession is only about three years removed from all but those considered alarmists and fringe-dwellers dismissing cybersecurity as having little relevance to industry practitioners. Read more about the physical-logical security assessment report by SSI for 2017 on Security Sales & Integration.

IoT, encryption, and AI lead top security trends for 2017

The Internet of Things (IoT), encryption, and artificial intelligence (AI) top the list of cybersecurity trends that vendors are trying to help enterprises address, according to a Forrester report released Wednesday. Read about the new report by Forrester which reveals that Internet of Things, encryption and artificial intelligence are the top cyber security trends of […]

‘Sizable Proportion’ Of U.K. Businesses Have No Formal Approach On Cyber Security

Read Dina Medland’s article about why United Kingdom businesses top the cyber attacks charts on Forbes : The U.K. government could be forgiven rising levels of frustration when it comes to the approach taken by many businesses on cyber security. Although three in ten (31%) now say it is a “very high” priority for their senior […]

Profiling The Insider Threat – Breaking Down a Complex Security Term

Read Dr Jamie Graves’ article about how to deal with insider threats on Infosec Magazine  : From a disgruntled employee looking to destroy IP, or an opportunist looking to make money by selling data, all the way to a security-naïve worker that might unwittingly let criminals into your network without knowing it, there are dozens of […]

How to Prevent Costly and Dangerous Cyberattacks

Read Greg A. Hood’s article about how businesses can prevent costly and dangerous cyber attacks on Medscape : There are two types of practices: those that have been hacked, and those that probably will be hacked. Large and small practices are vulnerable to data breaches. However, many resources are available to thwart an attack, and […]