Please turn on your JavaScript for this page to function normally.
wireless
Four wireless standards hackers will target after Wi-Fi

When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …

secure
Web security and high availability for blockchain-based businesses and financial institutions from Incapsula

Blockchain and cryptocurrency news was all the rage last year and it looks like that trend will continue to rise in 2018. Blockchain technology is on its way to being adopted …

Windows 10 patch
March Patch Tuesday forecast: In like a lamb, out like a lion

It’s March and up here in the Midwest we have a saying for this early spring month, “In like a lamb, out like a lion.” Often the month of March comes with a …

city
Infrastructure security: Don’t just sit there, do something!

Around 4am on March 28, 1979, things started to go badly wrong deep inside the bowels of reactor number two at Three Mile Island. Routine maintenance to clear a blockage …

storm
How can IoT stakeholders mitigate the risk of life-threatening cyberattacks?

With an estimated 20 billion Internet-connected devices set to appear in our homes and offices by the end of the decade, future cyberattacks will dwarf what we’ve seen …

key
Vermeer’s Camera: Uncovering the link between art criticism and cybersecurity

My mother is a lacemaker; thus, her attachment to the Vermeer painting of that name. It’s in the Louvre. If you only know it from reproductions, it’s smaller than …

laptop
How to choose a penetration testing service

Penetration testing or pen testing for short is a simulation of an attack on your company’s IT infrastructure or specific assets in order to assess the security posture …

iPhone business
How to improve your security infrastructure when you’re on a budget

When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the …

automate
Automating out of the skill gap sinkhole

The cybersecurity skills gap is one of the most daunting challenges facing the industry. We have a vibrant ecosystem of technology vendors developing shiny new tools, but the …

cryptocurrency
Cryptojacking is the new malware

The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …

GDPR
Is GDPR-regulated data lurking in unexpected pockets of your organization?

A recent study showed that over 60 percent of corporate data is stored on employee endpoints. And yet, as companies work to ensure compliance with the new General Data …

Office 365
How to protect Office 365 data from ransomware attacks

Given the broad scope of services Microsoft Office 365 provides, it’s no surprise it has become one of the company’s fastest growing revenue streams. Widespread …

Don't miss

Cybersecurity news