New Security Report Highlights Trends in Mid-Market Business Malware
By Emil Hozan, Security Analyst, WatchGuard Technologies As the security landscape continues to grow and shift, WatchGuard’s Threat Lab research team continues to offer insights into the latest malware and…
Out-Smarting the Cybersecurity Skills Shortage
By Ofer Or, VP of Product, Tufin Organizations across the globe are struggling to recruit the talent they need for their open security roles. Unfortunately, the problem is expected to…
The Only Recession in Cybersecurity
Sleep-deprived, overworked and fatigued security professionals impose huge risks to an organization By Karl Sharman, Vice-President, BeecherMadden Tired, overworked and fatigued employees pose huge risks to organizations. It’s obvious to…
Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days…
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once…
Oh, my! PerCSoft’s Irony
By Charles Parker, II; MBA/MSA/JD/LLM/PhD PerCSoft is a Wisconsin business. The organization provides online data backup services for dental offices. This operates by placing data in the cloud. They had…
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us…
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed…
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these goods. The competition is tight…
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and…
Sprint Beta Testing 5G Smart City in Georgia
By Kayla Matthews, Freelance Writer, Productivity Bytes Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though the test doesn’t encompass the whole city, it…
Secure Data Is Gold: U.S. Immigration Options for Cybersecurity Experts
By Lin Rose Walker, Esq. and Scott R. Malyk, Esq. A decade ago, very few people outside of the Information Technology (IT) industry knew what cybersecurity was or even considered…