Latest Posts

D36d0936f0c839be7bf2b20d59eaa76d

Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

April 07, 2020 Added by:Steve Durbin

Marriott International has experienced their second data breach

Comments  (0)

2054518f64771a7898b1b5d0a1e146cc

Examining Potential Election Vulnerabilities: Are They Avoidable?

April 07, 2020 Added by:Tim Matthews

In the U.S and global communities, election security is a large concern.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Google Skips Chrome 82, Resumes Stable Releases

March 29, 2020 Added by:Ionut Arghire

Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Cyberattacks a Top Concern for Gov Workers

March 03, 2020 Added by:Ionut Arghire

More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Hackers Target Online Gambling Sites

February 19, 2020 Added by:Ionut Arghire

Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

Fa42af438e58b799189dd26386f5870f

SEC Shares Cybersecurity and Resiliency Observations

January 30, 2020 Added by:Ionut Arghire

The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

What Does Being Data-Centric Actually Look Like?

January 17, 2020 Added by:Sam Bocetta

Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business.

Comments  (0)

4ebb71b142fbe23222c175ac358e4700

The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

January 17, 2020 Added by:Zack Allen

Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.

Comments  (0)