A Lack Of Cybersecurity Funding And Expertise Threatens U.S. Infrastructure

Read why Ellis Talton and Remington Tonar say that lack of funding and expertise can threaten U.S. infrastructure from cyber attacks on Forbes : As our physical infrastructure becomes increasingly digitalized, it also becomes increasingly vulnerable to cyber attack. Russian hackers, for example, have been trying to compromise U.S. electrical infrastructure for years, and successfully […]

The Cambridge Analytica saga is a scandal of Facebook’s own making

Read why John Harris says that Facebook mess was inevitable as Facebook has worked tirelessly to gather as much data on users as it could – and to profit from it on The Guardian : Big corporate scandals tend not to come completely out of the blue. As with politicians, accident-prone companies rarely become that […]

Selling Cloud-Based Cybersecurity to a Skeptic

Nearly five years ago, a study conducted by the MIT Sloan Management Review found that the vast majority of business managers surveyed believed that “achieving digital transformation” – the process of virtualizing operations and migrating toward the cloud – was critical to their organizations. Yet the same report showed that 63% of respondents believed their organization was […]

How to adopt a DevSecOps methodology: Start by taking a look at culture

Read Mike D. Kail explain how companies can successfully transition to a DevSecOps methodology for better cyber security culture on Jaxenter : Thousands of data breaches occur each year, largely a result of source code and application-level vulnerabilities. This past year, we witnessed the massive Equifax data breach, which occurred due to a vulnerability in Apache […]

Business must tone down its lust for big data

Read Stilgherrian explain how businesses’ lust for big data is damaging trust and breaching privacy on ZDNet : It should come as no surprise that when key industry bodies write submissions to government consultations they’re self-serving. That’s what such lobby groups are for, right? Read his full article here.

IoT security needs a white knight

Read why Internet of Things connected devices need a white knight for cyber security according Jon Gold to on Network World : Thanks to the Mirai botnet attacks, few people in the world of tech need a reminder that IoT devices remain a serious threat to enterprise networks. Still, more than a year after the […]

Risk and Opportunity in the Internet of Things

Read Tom Quigley’s article about the risks and opportunities in the Internet of Things world on Brink News : Can you envision 30 billion devices connected to the Internet of Things (IoT) by 2030? What about 100 trillion connected devices? That’s the number that Oliver Wyman predicts could be the reality by 2050. Read his full […]

Automation Could Be Widening the Cybersecurity Skills Gap

According to Cybersecurity Ventures, the cybersecurity skills shortage is now expected to hit 3.5 million positions by 2021 — a huge jump from current estimates of 1 million job openings. To help compensate for the growing shortage of talent, the cybersecurity industry is embracing artificial intelligence and automation to fill the gap. Read why Gary Golomb, Co-Founder & […]

5 Reasons the Cybersecurity Labor Shortfall Won’t End Soon

Cybersecurity Ventures predicts there will be 3.5 million unfilled jobs by 2021, up from 1 million at the end of 2013. With a growing awareness of the cybersecurity workforce shortage, why is the problem getting worse each year? Read about the 5 main reasons why the cybersecurity labor shortfall won’t end soon according to Steve Morgan, the founder and […]

Limit the Internet of Things for Security’s Sake

Read why  Sam Bocetta that companies should limit the Internet of Things for securities sake on News Max : Last month, ARM announced a new security protocol for embedded systems. They are calling it Platform Security Architecture, and have managed to get an impressive array of tech firms to sign up. Read his full article […]