Latest Posts


Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors

April 07, 2020 Added by:Steve Durbin

Marriott International has experienced their second data breach

Comments  (0)


Examining Potential Election Vulnerabilities: Are They Avoidable?

April 07, 2020 Added by:Tim Matthews

In the U.S and global communities, election security is a large concern.

Comments  (0)


Google Skips Chrome 82, Resumes Stable Releases

March 29, 2020 Added by:Ionut Arghire

Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser.

Comments  (0)


Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)


Cyberattacks a Top Concern for Gov Workers

March 03, 2020 Added by:Ionut Arghire

More than half of city and state employees in the United States are more concerned about cyberattacks than they are of other threats, a new study discovered.

Comments  (0)


Hackers Target Online Gambling Sites

February 19, 2020 Added by:Ionut Arghire

Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.

Comments  (0)


When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)


SEC Shares Cybersecurity and Resiliency Observations

January 30, 2020 Added by:Ionut Arghire

The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.

Comments  (0)


What Does Being Data-Centric Actually Look Like?

January 17, 2020 Added by:Sam Bocetta

Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business.

Comments  (0)


The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

January 17, 2020 Added by:Zack Allen

Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.

Comments  (0)