Cyber security specialists in demand as threat from online criminals and cyber attacks continues to grow

Cyber security specialists are in demand as organisations face a growing threat from online criminals. Adam Shapley, senior regional director from recruiters Hays Information Technology says the implications of being attacked online are far reaching. Read why Adam Shapley of Hays Information Technology says that companies are scouting for cyber security pros even as cyber attacks […]

3 Ways Blockchain Is Revolutionizing Cybersecurity

Read Omri Barzilay list the three ways in which blockchain technology could revolutionalize cyber security on Forbees : The second quarter of 2017 was a wild one for blockchain companies and investors, with nearly 60 initial coin offerings (ICOs) closed in the quarter for more than $750 million, and it looks like this is just […]

Why you need to implement security controls across your environment

Read why Mirko Zorz says that companies need to implement security controls across their entire environment on Help Net Security : In this podcast recorded at Black Hat USA 2017, Tim White, Director of Product Management, Policy Compliance at Qualys, discusses the importance of security configuration assessment as part of a comprehensive vulnerability management program, and […]

Cybersecurity is a big issue for the healthcare industry

Read why Thomas Russell says that healthcare industry still lags behind in cyber security on Colorado Springs Independent : Our healthcare industry is woefully behind the financial and government industries when it comes to protecting data from intruders. Budgeting, recruiting cyber security professionals, a lack of understanding, and awareness and training in modern cybersecurity risks are […]

Retailers Fear Data Breaches — Here’s How They Can Guard Against Them

Read Phil Goldstein’s article about how retailers can take guard against data breaches on Biz Tech Magazine : It almost seems like data breaches at retailers are inevitable. Several retailers have suffered high-profile data breaches so far in 2017, including Arby’s, Saks Fifth Avenue, Brooks Brothers and Kmart. While U.S. retailers report fewer breaches this […]

The data breach blame game

Read Nick Ismail’s article on the data breach blame game played by victim firms on Information Age : The cyber threat to UK business is significant and growing. Since February, when the National Cyber Security Centre was opened, the UK has been hit by 188 high-level attacks which were serious enough to warrant NCSC involvement, […]

Does Your Breach Incident Response Plan Have Holes?

Read Xuyen Bowles’ article about cyber security on Information Week : In 2016, the number of data breaches in the US reached a record high of 1,093, according to a study by the Identity Theft Resource Center and CyberScout. That was a 40% increase over 2015. Read his full article here.

The best enterprise anti-virus protection may not be enough

Read why Maria Korolov says that traditional anti-virus solutions are not enough for enterprise security on CSO Online : Traditional signature-based anti-virus is notoriously bad at stopping newer threats such as zero-day malware and ransomware, but it still has a place in the enterprise, experts say, as part of a multi-layer endpoint security protection strategy. […]

Finding the Right Balance between Protecting Data and Fostering Innovation

Read Yanni Charalambous explain why it is important for businesses to find the right balance between protecting data and fostering innovation on CIO Review : Whether the reputation is fair or not, the oil and gas industry is often considered a “laggard” in adopting the latest technologies. Considering the current energy commodity price environment, adoption of […]

The Two Online Security Steps You Should Stop Putting Off

Read Tim Herrera explain the two steps that you should avoid in online security on New York Times : Bill Burr, the father of the modern password, apologized last week in The Wall Street Journal (paywall) for a 2003 report he wrote on passwords that said we should all use p4s$W0rd$ t|-|aT l00k LiK3 7hi$. […]