The Two Online Security Steps You Should Stop Putting Off

Read Tim Herrera explain the two steps that you should avoid in online security on New York Times : Bill Burr, the father of the modern password, apologized last week in The Wall Street Journal (paywall) for a 2003 report he wrote on passwords that said we should all use p4s$W0rd$ t|-|aT l00k LiK3 7hi$. […]

How CISOs can make execs more security-aware

Read Howard Solomon article about how CISOs can make more executives aware of cyber security issues on IT World Canada : Most CISOs know by now that cyber attacks on the executive suite are increasing. Just this week a prankster duped British Home Secretary Amber Rudd (or her office) into replying to an email that looked […]

Five things you need to know about executive protection

Read list five things that companies need to know about CEO, CISO, CSO protection on CSO Online : Protecting executives today is about much more than physically shielding them from danger. The cyber security risks are higher than ever, and organizations need to ensure that the network and data access many high-level executives have doesn’t […]

The 10 most important CEOs in the security business

Read Anas Baig list ten top most CEOs of cyber security arena on Beta News : If you work in the cybersecurity industry or are interested in getting into the field, it’s important to stay up to date with the latest trends, developments and advancements. One of the best ways to stay updated with the most […]

Top 10 Security Startups to Watch in 2017

Read Jessica Lyons Hardcastle  list top 10 security startups to watch out for in 2017 on SDX Central : In recent months a flurry of security startups have emerged from stealth mode (would you expect anything less?) and unveiled new products that use the latest technologies including machine learning, artificial intelligence (AI), and blockchain to […]

Staying in Front of Cybersecurity Innovation

Read why Rinki Sethi says that companies need to stay in front of cyber criminals through innovation on Dark Reading : Cyber attackers can launch thousands of attacks daily. Many of these same attackers don’t even need serious technical expertise to do so; they can simply purchase (or even rent) DIY hacking toolkits or subcontract […]

The internet of things and cybersecurity vulnerabilities

The internet of things is defined as the interconnectivity or networking of devices, sensors and electronics to communicate through software. With IoT and the typical computing infrastructure that is very familiar, the change in data, access, connectivity and monitoring requires a cybersecurity approach. Read the analytical article about Internet of Things and how it effects […]

Cybersecurity needs to escape ‘groundhog day’ says IBM’s Global Executive Security Advisor

In 1993’s Hollywood movie ‘Groundhog Day’, Bill Murray plays a character who is caught in a time warp, and keeps reliving the same day for thirty years. Citing this example, Diana Kelley, Global Executive Security Advisor, IBM says the industry is also having its own version of Groundhog Day as the cybersecurity professionals keep repeating […]

Cybersecurity is important for businesses, individuals

There are 82,000 new pieces of malware — computer viruses, for example — created every day that could infect a computer and be used to commit cybercrime, according to Creative Consultants Group vice president for business development Adrian Brown. Read why Adrian Brown of Creative Consultants Group says that cyber security  is important for businesses […]

The future of the Internet of Things: security is everything

The Internet of Things (IoT) is counted among emerging technologies that promise to transform the South African market. While the opportunity for IoT is young in South Africa, its potential influence is far-reaching. For example, in the mining industry, devices monitor air quality, seismic activity, shaft stability, equipment wear, and energy usage Read why cyber security […]