
Security spring cleaning: 5 tips for tidying up network safeguards
Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t …

Prioritizing risks in a climate of geopolitical threats
The cybersecurity landscape has become increasingly hostile in recent years, with a growing threat from common cybercriminals as well as the looming shadow of state-level …

Cybersecurity skills shortage still the root cause of rising security incidents
The cybersecurity skills shortage is worsening for the third year in a row and has impacted nearly three quarters (74 percent) of organizations, as revealed in the third …

What CISOs should focus on when deciding on a strategy
The effectiveness of an organization’s security strategy and implementation can sometimes be difficult to assess. Michael Hamilton, President and CISO of CI Security, …

A deeper look: How the 281 data breaches in Q1 2019 will impact companies
High-profile data breaches show no sign of slowing down. In the first quarter of 2019, there were 281 reported data breaches, exposing more than 4.53 billion records. …

Three ways GDPR benefits US companies
It’s hard to believe we’ve almost reached the one-year anniversary of the date the General Data Protection Regulation (GDPR) went into effect. Leading up to that May 25, 2018 …

Securing satellites: The new space race
A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite floating in …

C-level executives increasingly and proactively targeted by social breaches
C-level executives – who have access to a company’s most sensitive information, are now the major focus for social engineering attacks, alerts the Verizon 2019 Data Breach …

3 months, 1900 reported breaches, 1.9 billion records exposed
There were 1,903 publicly disclosed data compromise events in the first three months of the year, exposing over 1.9 billion records, according to Risk Based Security. No other …

Executing a multi-cloud strategy: Crawl, walk, run
Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those …

Is curiosity killing patient privacy?
The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of …

What will phishers do once push-based MFA becomes widely used?
As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …