It Is A New Era For Data Privacy And Regulations

With the GDPR having begun its reign as the most comprehensive digital privacy legislation that the world has ever seen, we’ve officially entered a new era of data privacy rights and regulations. But it’s also a compliance burden to many businesses. Here are the four biggest rewards that businesses can reap by complying with privacy regulations like the GDPR – even if they don’t need to.

Will Quantum Computers Really Destroy Cybersecurity In Just A Few Short Years?

Quantum computers use a new unit of measurement, a single atom known as a qubit that greatly increases the computational power of a system, and this system will be more powerful than anything we’ve seen in history. In fact, quantum computing could render most modern security protocols obsolete within a few years.

2018 FIFA World Cup: Open Season For Malicious Threats?

Athletes, fans and the media are getting ready for first kick-off at this year’s FIFA World Cup at Spartak Stadium in Russia. But they are not the only ones. So are cyber criminals looking to hack into the mobile phones of billions of FIFA fans.

Strategic Advice To Help CISOs Win The Battle Of The Budget

Today’s CISOs have one thing in common: the pressing need for funding to keep their security programs vital. Worldwide IT security spending jumped nearly 8 percent in the past year to top $90 billion, and it’s forecast to climb above $113 billion by 2020, but despite these numbers, executive decision-makers now want InfoSec costs inexorably linked to business value and return on investment.

It's A Hybrid World After All. How Do We Secure It?

In the new, hybrid world of IT — often described as borderless — traditional approaches to security have been become inadequate. This article examines the new risks introduced by hybrid IT computing, the challenges these pose, and best practices for addressing them.

It’s Time For Organizations To Embrace Secure Messaging

With 281 billion emails sent every day, it’s no surprise that 91 percent of all cyberattacks and 98 percent of social engineering campaigns begin with email phishing scams. Vaporstream CEO Dr. Galina Datskovsky explains why EFAIL proves that it’s time to stop relying on email and instead embrace a more secure messaging solution.

Web-Scale Social Engineering: Phishing Beyond Email

Although phishing attacks have been around for many years, they have evolved to form the current fourth-generation threat landscape: phishing beyond email. The real question for security teams is how are untrained, non-security staff supposed to recognize these threats?

You Think Phishing Is Terrible? Let's Talk About Spear Phishing

Research shows that about half of healthcare organizations rely only on once-a-year security awareness training to educate their users about existing threats and best practices to identify and avoid these threats. For an industry swimming in sensitive information, an annual cybersecurity check-up just won’t cut it.

While SIEMs Are Necessary, They Are No Longer Sufficient

SIEMs currently fight the cybersecurity war ten miles from the front line, reviewing logs to show that an attack happened and replaying the steps required to prevent it from happening again. New tools such as Artificial Intelligence must move this battle closer to the front lines, allowing security teams to transition from threat detectives to threat hunters seeking out attacks before they happen.

Should U.S. Companies Be GDPR Compliant? Yes!

GDPR is now the standard industry best-practice, so if you are not taking the steps outlined in this regulation, your data protection approach will be viewed as out-of-date, incomplete, and possibly negligent. In our global, digital village, you need to incorporate standards from around the world into your information security systems.

How To Execute A Full Disaster Recovery On A Part-Time Budget

Companies know that they must plan to ensure business continuity in the event that a disaster occurs, but most companies are unaware that a disaster recovery (DR) plan requires more than simply managing backups. Michael Stolarczyk of Veristor explains how DR-managed services through a trusted advisor can replace the necessity for a full-time DR staff as well as offer a solution that is synchronized with your business continuity requirements.

Neurodiversity Is A Superpower For Hacking And Cybersecurity

The atypical brain (Autistics, Aspergers, etc.) is wired differently than the classic or “neurotypical” brain, and this cognitive difference has a strong impact on the world of cyber defense and cybercriminals. ASPertise founder Frédéric Vezon explains why the inclusion of Atypicals in the software/architecture building process will reduce the cognitive blind spots and increase the security of the systems.

Companies Lost Trust In Their Users. What's Next?

Data breaches reached a historic high in 2017, with 1,579 reported, which left 179 million records exposed. Ryan Wilk, VP of Delivery for NuData Security, explains why a whole new authentication framework is needed that positively identifies customers online and biometrics is helping to solve this challenge.

Top 3 Crypto Mining Botnets: Smominru, DDG, and ADB.Miner

Botnets have facilitated different types of cybercrime for years – the most common use cases revolve around DDoS (Distributed Denial of Service) attacks and massive spam campaigns – but things are starting to change. A new segment of cybercrime is shifting toward a paradigm where botnets do not DDoS or spam – they mine cryptocurrencies.

Cybersecurity For SMBs: Why Identifying & Protecting Critical Information Assets Should Be A Foundational Element Of Your Security Program

The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.

What Your ISP Knows About You

We’ve all heard the stories about ISP employees monitoring user traffic for the sake of private gain or when dying of boredom, but are those legends true? David Balaban, a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation, shows us what your Internet service provider (ISP) really knows about you.

Our Best Cyber-Defense For The Future: Teenage Technologists

Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.

The Threats That Are Keeping CISOs Up At Night

RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.

Automation Is The Core Of Data Protection

For organizations, the average total cost of a data breach is over $3 million. For employees or customers, the cost is a loss of privacy, identity theft, and immediate or future monetary loss. Here's why automation is the core of data protection and why it should be a business priority this year.

3 Signs Your Website Security Strategy Is in Need of a Refresh

The threat of cybercrime continues to grow, and small and medium-sized businesses (SMBs) should be especially concerned as they lack the IT budget and resources that larger enterprises have and are thus more likely to struggle after suffering a breach. For those guilty of letting their website security strategies sit on the back burner, SiteLock president Neill Feather suggests that it may be time to consider a strategy refresh.