The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict…
Understanding the True Value of Digital Health Data
By Anne Genge, CEO, and co-founder of Alexio Corporation The story of Bob ‘What do I care if someone reads my dental chart?” This is what Bob said before I…
Best Practices for Building A Comprehensive Cyber Risk Management Program
By Haythem Hammour, Product Marketing Manager, Brinqa A primary goal for most information security organizations today is the identification, prioritization, and remediation of cyber risk. Businesses struggle with risk management…
Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and…
Conquering the Cyber Security Challenges of The Cloud
By Steve Durbin, Managing Director, Information Security Forum Cloud computing has become a prevalent force, bringing economies of scale and breakthrough technological advances to modern organizations, but it is more…
AttackiQ Report On Ponemon Survey:Despite Spending An Average Of $18.4 Million On Cybersecurity Solutions, Organizations Still Get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By…
Hacking the Vote: Article One of Many….any [Q+]uestions?
Diebold AccuVote-TSx Election Machine Hacking (first example, expect more, especially after tonight in New Hampshire…) My vote DID NOT count tonight. If you understand Optical Character Recognition (OCR) and about…
CEO Action for Diversity & Inclusion™ Coalition is Trailblazing the Path to Workplace Integration!
Las Vegas, NV – Issues of prejudice and bias in the workplace are making headlines across the country. The national discourse on these topics are reaching a fever pitch, and…
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view…
How to Know If Someone Is Watching You on Your Camera
In this era of video chatting and social media live streaming, your computer’s webcam can never be more relevant. By Anda Warner, Marketing Specialist, SEOforX In this era of video…
How to Stay Safe on Public Wi-Fi Networks (Detailed Guide)
Connecting to public networks is easy but staying safe on these networks is not easy as we think! Here are some tips to stay safe on public hotspots. By Susan…
Maze Ransomware operators threaten victims to publish their data online
The victims of the Maze Ransomware now face another threat because operators behind the malware could become publish their data online. The victims of the Maze Ransomware are facing another…