Server less Security Analysis: The Best Practices on How to Enforce Them
By Aaron Chichioco, content editorial manager/web designer, Design Doxa Even before companies started making the jump to go serverless, security has already been a concern in a world largely becoming…
Voice Commerce Calls for Built-in Security
By Julian Weinberger, NCP engineering In the mid-1990s, retailers embraced the Internet to increase customers and to introduce new service offerings. A new breed of online-only merchants quickly emerged to…
Ready Position – Proactive Teams are Helping Solve the Cyber security Skills Shortage
By Aidan McCauley, Vice President of Technology Investments, IDA Ireland Some of the fans glancing toward the outfield at a baseball game may be recalling their own Little League days. …
Public Sector Beware: 3 Steps to a Better Cyber attack Prevention Strategy
By Phil Richards, CISO, Ivanti Just as healthcare organizations were a popular target of ransomware attacks over the past two years, public sector organizations (including school districts, municipalities and local…
Ways to Protect Sensitive Data Online
By Ebbe Kernel, data mining researcher & writer The world has witnessed a number of high-profile data breaches over the last couple of decades. While the impact of these breaches…
August Patch Tuesday
Take Advantage of Your August Patch Tuesday Break By Chris Goettl, Director of Product Management, Security, Ivanti August Patch Tuesday was a pleasant relief after the massive release of updates…
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers…
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness….
Part III: Current and Future IoT Threats
The relationship between IoT and Wi-Fi By Ryan Orsi, Director Product Management, WatchGuard Technologies In parts one and two of this series, I covered the importance of understanding the anatomy…
The Risks (and Prevention) of Crime-as-a-Service in Healthcare
By Kurt Long, Founder, and CEO, FairWarning The recent study from the Brookings Institution detailing that 25 percent of hacking attempts will focus on healthcare data should serve as a…
Irish electricity transmission system operator EirGrid targeted by a nation-state actor
The Irish electricity transmission system operator EirGrid was targeted by a state-sponsored actor, the hackers weren’t discovered at least for two months. The Irish electricity transmission system operator EirGrid was…