Blog
A two-pronged strategy for IoT security awareness
February 7, 2020
0 Comment
By Brent Hansen
The full-blown internet of things may seem far in the future, but IT decision-makers need to address it now. “Smart home” applications are becoming commonplace in the consumer world, and IoT adoption is growing quickly in the enterprise. Given that IoT is all about collecting and sharing data from a
IoT Security Threats in Retail: How Do We Eliminate Them?
February 6, 2020
0 Comment
By Andrew Zola
The number of smart connected devices on the Internet, including cameras, machines, and sensors, has grown exponentially. According to the premier market research firm, International Data Corporation, by 2025, it’s estimated that we will have approximately 41.6 billion connected devices. That number includes the adoption of the Internet of Things (IoT)
4 key trends to hit the cybersecurity industry in 2020
February 4, 2020
0 Comment
By Hope Reese
Cyberthreats have become increasingly sophisticated –– the top threats predicted in 2020 include weaponized email attachments and links, ransomware, and banking trojans and other browser-based password hijackers –– as well as greater in scope. According to TechRepublic’s Jack Wallen, businesses should be prepared for “an inordinate rise of security breaches, attacks, and incidents”
Careers in fintech-related cybersecurity
February 1, 2020
0 Comment
By Avery Phillips
The idea of getting your identity stolen or losing valuable personal information online is a relatively new threat that has taken the world by storm. It almost seems like no matter what you do to try to protect yourself, you are always at some level of risk. Especially as much
With 5G And IoT, It’s A New Day With New Risks
January 30, 2020
0 Comment
By David Higgins
Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of Things (IoT) has already become commonplace in our lives, thanks to all the connected devices and smart technologies we own, interacting with one another to create a fully connected network.