The challenges of an Internet of Things analytics
By Milica D. Djekic Through a history – we would notice the importance of good analytics in many areas of human activities. For instance, many military strategists would deal with…
Addressing the government data security problem
By Marcelo Delima, Global Product Marketing Manager at HPE Security – Data Security Throughout federal, state, and local governments, the digital revolution is driving exponential growth of high-value data. Personally…
10 cyber security measures growing companies should implement
Tips to keep your business safe as it expands By Asher de Metz, Lead Senior Consultant (Information Security), Sungard Availability Services (Sungard AS) This may surprise you, but growing companies…
Best Practices to keep your Home WiFi Secured
by Lisa Barrie, Sub-editor at List Enthusiast Wi-Fi internet or traditional wired internet? Ask any person and he/she’ll go for the former. The ease-of-use, easier installation, and maintenance mean Wi-Fi…
Multi-factor Authentication Implementation Options
“2FA to 5FA – What are the options available?” By David Smith Independent Consultant at Smart Card Institute At some point of time, we have all used an OTP (One-time…
How Real-Time Asset Intelligence Enables Full Posture Control
By Ellen Sundra, VP of Americas Systems Engineering, Forescout Technologies The massive growth of devices hitting our networks is not a secret or a new discussion. We have all seen…
The Dangers of the Integrated Home/Workplace
Personal data breaches are one of the fastest-growing cybercrimes in the US. As IoT devices become increasingly common at home and in the workplace, measures must be taken to secure…
Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming…
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to…
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. …
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local…
Data Risk Report Shows Lack of Security across Industries
87% of companies lack data security By Rob Sobers, software engineer, Varonis When it comes to cybersecurity, one of the top concerns is the risk and vulnerability of sensitive data….