Hack yourself first: How we can take the fight to the black hats
The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …
A few small steps for man, a giant leap for online security
The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …
Expert tips to address third party security risks
Risks to sensitive data have never been greater. With the rise in cyber attacks and data breaches, outsourcing to third parties can present an exponential threat to …
What security tools do healthcare organizations lack?
The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused …
5 tips to avoid identity theft
“Tax fraud is widespread and happening as you read this,” says security and identity theft expert for Credit Sesame, Neal O’Farrell. “In the first week …
3 ways to advocate for data security at your company
There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …
Security framework for governments deploying the cloud
ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …
Black hole routing: Not a silver bullet for DDoS protection
As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …
Addressing cybersecurity business disruption attacks
Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
Declaring personal data bankruptcy and the cost of privacy
In the digital economy, your data profile has value, but judging from what I watched happen recently in a London shopping mall, a lot of us give it away for free. At the …
6 steps for effective rights management
Significant data breaches in both government and industry are in the headlines at an unrelenting pace. Some of these breaches are enormous in scale and impact, and all have …