Experts Corner

Neurodiversity Is A Superpower For Hacking And Cybersecurity

The atypical brain (Autistics, Aspergers, etc.) is wired differently than the classic or “neurotypical” brain, and this cognitive difference has a strong impact on the world of cyber defense and cybercriminals. ASPertise founder Frédéric Vezon explains why the inclusion of Atypicals in the software/architecture building process will reduce the cognitive blind spots and increase the security of the systems.

Companies Lost Trust In Their Users. What's Next?

Data breaches reached a historic high in 2017, with 1,579 reported, which left 179 million records exposed. Ryan Wilk, VP of Delivery for NuData Security, explains why a whole new authentication framework is needed that positively identifies customers online and biometrics is helping to solve this challenge.

Top 3 Crypto Mining Botnets: Smominru, DDG, and ADB.Miner

Botnets have facilitated different types of cybercrime for years – the most common use cases revolve around DDoS (Distributed Denial of Service) attacks and massive spam campaigns – but things are starting to change. A new segment of cybercrime is shifting toward a paradigm where botnets do not DDoS or spam – they mine cryptocurrencies.

Cybersecurity For SMBs: Why Identifying & Protecting Critical Information Assets Should Be A Foundational Element Of Your Security Program

The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.

What Your ISP Knows About You

We’ve all heard the stories about ISP employees monitoring user traffic for the sake of private gain or when dying of boredom, but are those legends true? David Balaban, a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation, shows us what your Internet service provider (ISP) really knows about you.

Our Best Cyber-Defense For The Future: Teenage Technologists

Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.

The Threats That Are Keeping CISOs Up At Night

RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.

Automation Is The Core Of Data Protection

For organizations, the average total cost of a data breach is over $3 million. For employees or customers, the cost is a loss of privacy, identity theft, and immediate or future monetary loss. Here's why automation is the core of data protection and why it should be a business priority this year.

3 Signs Your Website Security Strategy Is in Need of a Refresh

The threat of cybercrime continues to grow, and small and medium-sized businesses (SMBs) should be especially concerned as they lack the IT budget and resources that larger enterprises have and are thus more likely to struggle after suffering a breach. For those guilty of letting their website security strategies sit on the back burner, SiteLock president Neill Feather suggests that it may be time to consider a strategy refresh.

Digital Transformation Adds Cyber Risks To Financial Services

As banks innovate to meet the changing demands of connected consumers, they are also increasing their attack surface, potentially making highly sought-after user data more accessible to cybercriminals. To mitigate these threats, financial services firms have to be aware of the risks that come with new capabilities and adjust their security architecture accordingly.

Sorry, It's A Myth That Macs Are More Secure Than PCs

While Mac users like to believe that their systems are secure, the truth is that Macs really aren't more secure than Windows PCs; it's a myth that Apple computers are inherently more secure and don't get malware. Here are several things that Mac users can do to improve their security.

How About Treating Everyone’s Data As If It Were Your Own?

With May 25 looming, preparing for compliance with the European Union (EU) General Data Protection Regulation (GDPR) is an unavoidable necessity for businesses – and an important act of social responsibility.

What Happens To Enterprises If the Cybersecurity Bubble Pops?

Cybersecurity startups, relying on a seemingly endless stream of cash from VCs, are facing a harsh reality as organizations take a harder look at their cybersecurity ROI. When the funding stops, what does that mean for the industry and customers left holding the bag?

How To Pick The Right Cybersecurity Expert For The Job

Choosing a cybersecurity team should be a top priority for any organization, but it's often a challenge for a business to find qualified candidates. Dr. Eric Cole, CEO of Secure Anchor, provides four keys to finding the right cybersecurity expert for your company.

What Prevents Organizations from Using Even More Data?

Organizations can benefit from handling more data and doing more with their existing data, even when obstacles stand in their way. Here are three challenges that hold companies back from using more data and three difficulties of doing more with that data.

Cloud-Based Malware Weather Forecast for Financial Firms

Cyber attacks against financial institutions have been increasing in the past few years. But despite the apparent benefits that cloud computing can offer the financial industry, security concerns remain a roadblock when dealing with such sensitive data and strict regulations.

The Cost Of A Cybersecurity Breach For Financial Institutions

The number of data breaches have increased exponentially over the past few years, with a record 1,579 breaches in the U.S. alone during 2017 – and financial services firms fall victim to cybersecurity attacks 300 times more than other businesses. Here's how resolution services can mitigate customer complaints and help retain them.

GDPR Is Coming Fast – Are You Ready To Catch This Train?

When the European Union’s General Data Protection Regulations (GDPR) becomes enforceable, many firms in the US will still not prepared to meet the needs of the regulation come May 25, 2018 – but the penalties for non-compliance are significant for businesses.

Machine Learning And The 5 Key Elements Of A Layered Defense

While machine learning, an application of artificial intelligence, is not new, customers still struggle to understand how it will benefit their efforts to defend their critical assets. When evaluating this technology, here are the five key components that are critical to effective machine learning and successful protection of the endpoint.

Staying Current On The Changing Threat Landscape: The Role Of The National Vulnerability Database (NVD)

The National Vulnerability Database (NVD is a leading source of intelligence on vulnerabilities for InfoSec professionals, and while it provides many benefits, it also has its limitations. This article will explain the advantages of using the NVD for vulnerability management, point out some of the blind spots that have occurred recently, and recommend best practices for successful mitigation.