Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site…
The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year
By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to…
Top 10 Data Breaches of the 21st Century
This article looks into the biggest data breaches of the 21st century (so far!) By Nicole Allen, Marketing Executive, SaltDNA. This article looks into the biggest data breaches of the…
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear…
NCSAM Provided an Opportunity to Reset Our Approach to Cybersecurity
October marked National Cyber Security Awareness Month, but experts warn that cybersecurity requires attention 24/7/365 By Sam Humphries, Security Strategist, Exabeam Earlier this year in the rapid transition to a…
4 Reasons Why Cyber Security Is Important in Your Business
By Gabe Nelson, Content Specialist, Bonus.ly Cyber-attacks are incredibly common and anyone can fall victim to them. Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national…
How to Avoid or Remove Mac Malware
Today, Macs are more prone to hacking attacks than PCs. In this article, you’ll find useful tips on how to detect malware on your computer and get rid of it….
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security By Kaushik Narayan, CTO Cloud Business Unit, McAfee While cloud services deliver on promised savings and convenience, they still…
5 Steps to Ensure Iot Security Amidst CMMC Compliance
By Mike Raymond, Federal Sales Manager, Ordr Cyber threats against the U.S. and the Department of Defense (DoD) are very real, and efforts related to the department’s Cybersecurity Maturity Model…
Why Deepfakes Will Threaten the Future of Digital Communications
By Steve Durbin, Managing Director, Information Security Forum Advanced deepfakes of high-profile individuals or executives will soon threaten to undermine digital communications, spreading highly credible fake news and misinformation. Deepfakes…
How Can CISOs Work with CMOs to Secure Social Media?
By Otavio Freire, CTO & Co-Founder, SafeGuard Cyber Recent reports indicate that over half of the global population now uses social media – up 10.5% on last year’s 3.5 billion…
Cyber Security Patent Lawsuits on The Rise and The Need for Shared Innovation in Cyber Security
By Keith Bergelt, CEO of Open Invention Network (OIN) According to the FBI’s Internet Crime Complaint Centre, by June of 2020, daily digital crime in the U.S. had risen by…