Blog
IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022
April 13, 2020
0 Comment
By Matthew Heusser
The Information Security Forum predicts the coming threats with a very good track record so far. Get your company ready for these threats. Armed with a “state of the industry” survey, most companies try to identify gaps to play catch up. In cybersecurity, that is too late. Companies need to
By Derek Handova
As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems? The fifth generation (5G) of cellular phone technology is upon us. You can hardly turn on your TV or stream a YouTube video without
IoT security failures are no child’s play
April 8, 2020
0 Comment
By Chetan Conikee
IoT device numbers have soared, organisations must fix vulnerabilities in development to better protect devices. Just over the past few years, the Internet of Things (IoT) has emerged as a powerful and widespread technology. In fact, IDC has estimated there will be 41.6 billion connected IoT devices, generating 79.4 zettabytes
Cybersecurity Tips While Working Remotely
April 8, 2020
0 Comment
By Jonathan Black
Cyber actors are taking advantage of the world becoming increasingly reliant on the internet and virtual communications to stay connected and collaborate during COVID-19 pandemic. The number of phishing websites increased by 350 percent from January to March, according to a report by Atlas VPN, a company providing resources to
Data Security in the Cloud Best Practices
April 7, 2020
0 Comment
By Connor Craven
Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The