Latest Blog Posts
When Data Is Currency, Who’s Responsible for Its Security?
February 11, 2020 Added by:Jason Bevis
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?
Comments (0)
SEC Shares Cybersecurity and Resiliency Observations
January 30, 2020 Added by:Ionut Arghire
The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.
Comments (0)
What Does Being Data-Centric Actually Look Like?
January 17, 2020 Added by:Sam Bocetta
Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business.
Comments (0)
The Big 3: Top Domain-Based Attack Tactics Threatening Organizations
January 17, 2020 Added by:Zack Allen
Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.
Comments (0)
Security Compass Receives Funding for Product Development and Expansion
January 17, 2020 Added by:Kevin Townsend
Toronto, Canada-based Security Compass has received additional funding from growth equity investment firm FTV Capital.
Comments (0)
Password Shaming Isn’t Productive – Passwords Are Scary Business
January 15, 2020 Added by:Tim Mackey
With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.
Comments (0)
Five Key Cyber-Attack Trends for This Year
January 14, 2020 Added by:Marc Wilczek
5 key cyber-attack trends that are expected to develop during the coming months.
Comments (0)
20/20 Vision on 2020's Network Security Challenges
January 13, 2020 Added by:Avishai Wool
Organizations will likely need to embrace more automation across all security and compliance-related processes.
Comments (0)
Is Cybersecurity Getting Too Complex?
January 13, 2020 Added by:Sam Rubin
To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.
Comments (0)
Global Security Threats Organizations Must Prepare for in 2020
January 08, 2020 Added by:Steve Durbin
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.
Comments (0)
Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys
December 19, 2019 Added by:Shwetha Sankari
Enforcing encryption key management can effectively bridge the gaps in your enterprise privileged access security strategy.
Comments (0)
The Cybersecurity Skills Gap: An Update for 2020
December 18, 2019 Added by:Sam Bocetta
2020 will be a critical juncture for the entire cybersecurity sector
Comments (0)
Modernizing Web Filtering for K-12 Schools
December 18, 2019 Added by:Timur Kovalev
Today’s 24/7 Internet access world underlines the importance of fine-tuned web filters and content security across K-12 networks.
Comments (0)
University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
December 04, 2019 Added by:InfosecIsland News
University of Arizona-led teams will be more proactive in the battle against cyberthreats thanks to nearly $1.5 million in grants from the National Science Foundation.
Comments (0)
Securing the Internet of Things (IoT) in Today's Connected Society
November 19, 2019 Added by:Steve Durbin
The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.
Comments (0)
What Is Next Generation SIEM? 8 Things to Look For
November 14, 2019 Added by:Avi Chesla
Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.