Blog
What you may be getting wrong about cybersecurity
October 29, 2019
0 Comment
By Lysa Myers
When we hear about breaches, we assume that attackers used some never-before-seen, zero-day exploit to breach our defenses. This situation is normally far from the truth. While it is true that nation-states hold onto tastily crafted zero days that they use to infiltrate the most nationally significant targets, those targets
AI And Cybersecurity: Plague Or Promise?
October 28, 2019
0 Comment
By Bob Bruns
We hear from our teams every day regarding how cyberthreats to our enterprise are getting more frequent, more sophisticated and more targeted. Cyber intrusions, specifically publicly reported incidents, are on the rise. It’s easy to tune the warnings out, but we must remain vigilant. Our responsibilities to our clients, shareholders,
Closing the cybersecurity skills gap
October 28, 2019
0 Comment
By James Lyne
When most people thinking of cybersecurity and cybercrime the first thing they might think of is antivirus software or even anti-malware software. Yet how many of the students who collected their GCSEs or A Levels in the summer will know what a CISO is? A cryptographer? A threat hunter? A
5 steps for securing IoT deployments
October 28, 2019
0 Comment
By Johna Till Johnson
IoT represents a cybersecurity vulnerability that organizations can address with five steps to create an IoT-specific security strategy. Organizations risk security when groups outside of IT deploy IoT without informing IT admins, as well as when their IoT initiative is a formal project in pursuit of defined business goals. There
Best Remedies for Securing Android Mobile Transactions
October 27, 2019
0 Comment
By Nathan McKinley
Mobiles, one of the topmost and used by Billions of people across the world are busy using mobiles in either a positive or negative way. Nowadays, there are enormous cons of using Mobiles rather than its pros. Some important thoughts which are arising in the real market concerning mobiles are