The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict…
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
Accelerating the Pace of Government IT Modernization
By Jeff Elliott For decades, the federal government has been hamstrung in its efforts to adopt new IT systems by the glacial pace of RMF accreditation and the manual processes…
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer…
Data Privacy in A Device-Driven World: Navigating the Impact Of California’s 2020 IOT Security Legislation
A call for consumer education on-device security vulnerabilities in light of the increasing push for IoT security regulation By Brian Murray Throughout the past few decades, the Internet of Things…
AttackiQ Report On Ponemon Survey:Despite Spending An Average Of $18.4 Million On Cybersecurity Solutions, Organizations Still Get Breached
Enterprises plan on increasing their security budgets in the next year too. However, the key to preventing breaches relies upon accurately identifying and remediating gaps in current security defenses. By…
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks,…
Why Insider Data Breaches Will Continue in 2020
By Randy Reiter CEO of Don’t Be Breached Insider Data Breaches That Occurred in 2019 More than two-thirds of corporations are not prepared to combat Insider Data Breaches as reported…
The Growing Costs of Cyber Attacks on UK Small Businesses
By Dan Baker, Content Writer, SecureTeam The amount of cyber attacks in the UK and across the world continues to grow each year and small businesses are increasingly the targets…
Multifactor Authentication & The Sobering Reality for Organizations Without It
By François Amigorena, CEO and founder, IS Decisions Organizations without multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. Compromised credentials are…
The Perspectives Of The 5th Industrial Revolution
By Milica D. Djekic New days bring us so many new things. It would appear that we literally get overwhelmed by emerging and cutting-edge technologies. So many novel solutions deal…