Blog
Why 5G harbors multiple security weaknesses
December 19, 2019
0 Comment
By Lance Whitney
5G is being touted by many as the latest and greatest wireless technology with faster speeds and lower latency than its predecessors and the ability to juggle multiple devices, including Internet of Things (IoT) hardware and other demanding items. But concerns have arisen in some circles, including the European Union,
5 security operations and analytics trends to watch in 2020
December 19, 2019
0 Comment
By Jon Oltsik
According to ESG research, 36% of organizations are actively integrating disparate security analytics and operations tools in pursuit of a more cohesive security technology architecture (note: I am an ESG employee). Another 48% of organizations say they are somewhat active with security analytics and operations tool integration. This data describes
The Three Cyber Attacks Ruining Your Holiday Spirit
December 19, 2019
0 Comment
By Karen Bowen
By Karen Bowen The retail industry isn’t the only one that needs to worry about cyber attacks. In fact, all organizations are warned against increased threats due to careless employee behaviors during the holiday season. In a recent survey, half of the participants admitted to using a work-issued computer or mobile
Disney+ accounts hacked – How to protect yourself
December 18, 2019
0 Comment
By Amer Owaida
The long-awaited streaming service Disney+ was launched to the cheers of many. But it wasn’t without technical issues; in addition, within hours of the service going online many users were reporting that their accounts had been hijacked, writes ZDNet. The hacked accounts then started to appear on the dark web
6 Security Awareness Gifts for the Cybersecurity Unaware
December 18, 2019
0 Comment
By Michelle Greenlee
Better personal security in everyday life isn’t something everyone considers — at least, not until something goes wrong. Securing home devices and personal accounts can be daunting for those who just aren’t that interested in the devices or cybersecurity. Learning the basics of personal cybersecurity is not the most appealing activity to