The Security Challenges of Robotic Process Automation—A Primer
By Kevin Ross, Global Solutions Engineer, CyberArk Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These systems enable software robots to replicate the actions…
Cyber Safety Tips for The Holidays
Practicing Good Cyber Hygiene to Avoid Holiday Cyber Attacks By Dr. Bob Duhainy, Walden University Doctor of Information Technology core faculty member While millions of holiday shoppers will be spending money…
TTEC – On The Cusp of Receiving the Federal “Seal of Approval”
New York, NY – TTEC is about to receive FedRAMP (moderate) certification in January 2020, and DoD IL4 certification a few months after that. How did they accomplish this esteemed…
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an…
Software Defined Perimeter Deep Dive & Required Implementation Readiness
By Parthasarathi Chakraborty SDN, SDWAN & SDP have frequently encountered terminologies to the technology professionals these days. It is necessary to understand each of these terms before making any technology…
How to Erase Data from Mobile Devices: Four Common Misconceptions
By Mark Dobson, ITAD Specialist, NextUse When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the company data stored on them to end…
Here’s How You Can Secure Your App from Cyber Attacks
By Twinkle Do you know how many people own a smartphone? Well, you’ll be shocked to know that as per the researchers estimate the total number of mobile device users…
Are Financial Services the Golden Goose for Cybercriminals?
By Yair Green, CTO, GlobalDots The financial services industry has been a long-time favorite target for cybercriminals. They are always looking to steal information related to payment cards, online accounts,…
Talk About a Disaster
Fema Exposes Disaster Survivor’s Personal Data By Charles Parker, II; MBA/MSA/JD/LLM/PhD FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.). Over the years, FEMA has had…
How to Build an Effective Insider Threat Program: Part II, Technology
By Shareth Ben, Insider Threat SME at Securonix In the first part of this series, we discussed how insider threats can be mitigated by a well-thought-out insider threat program that…
The Intersection of Artificial Intelligence and Cybersecurity
By John Harrison, Director, Cybersecurity Center of Excellence, Criterion Systems It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years, and while it…
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may…