Blog
Dual-defense strategy for network security
September 12, 2019
0 Comment
By MICHAEL MURRAY
Recent headlines about ransomware attacks have elevated the urgency for public entities to implement effective measures to prevent cybersecurity breaches and avoid becoming the next news story. Government agencies, however, face unique challenges. They are often coping with limited technology budgets, poor cyber hygiene (including outdated and unpatched systems), a
Flipping a coin on cybersecurity?
September 12, 2019
0 Comment
By PAUL STAFFORD
Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you’re able to prevent – or recover from – a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business productivity and reputational losses — not to mention struggle to recover
Protect Your Enterprise by Setting Standards for Mobile Security
September 11, 2019
0 Comment
By Matthew Montgomery
Policy enforcement, deployment, updated and most importantly, standards, are all vital components of a mobile device security strategy.The year 2019 has been a banner year in the world of cybersecurity, with thousands of high-profile compromises impacting organizations across all sectors – from education, to financial services, to healthcare, to the
Equifax and Heartbleed are most-Googled cyber security terms
September 11, 2019
0 Comment
By Alex Scroxton
The Equifax data breach of 2017, which saw 140 million customer records compromised, and the Heartbleed OpenSSL cryptographic library vulnerability of 2014, which enabled hackers to easily steal personal information, are the most-Googled cyber security terms ever, and by implication the highest-profile security events of all time, according to new
No Matter Your Perspective on Cybersecurity, Need for SecDevOps is Evident
September 11, 2019
0 Comment
By Frank Downs
Cybersecurity, as a field, is viewed through many different lenses, depending on where a professional works within an organization. For example, lawyers and auditors often view cybersecurity as a compliance issue. These professionals are heavily concerned with procedure, policy, and performance, ensuring that individuals within their organizations are leveraging the