cybercrime

​SOC-as-a-Service In The City of Sparks, To Protect ​The Protectors

This article came as the result of a discussion with Sean Martin regarding how Arctic Wolf's work with the City of Sparks impacts the police and its officers. It describes how the police officers do their job differently and how an increase in tech and cyber changes the way they view society and the way they live their lives.

Cybersecurity Needs Technologists? Are You One Of Them?

How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

Not 100% Sure It’s Grandma? It’s probably Phishing

Could you spot a phishing attack if and when it crosses your inbox? What about your colleagues? Your executive staff and mangers that hold the keys to the kingdom? Read on to explore the anatomy of a phishing email and how to avoid falling prey to these attacks.

IoT Pose A Threat To Anything And Everyone Connected

When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.

Cybercriminals Make a Lot of Money. Because it is Too Easy

A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.

Cyber Threats Have Evolved. How About Your Insurance?

Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?

Unlike Lasagne, in InfoSec, There is No Layer Eight

2016 saw a record setting number of cyberattacks, resulting in the most records stolen in the seventeen years that breaches have been tracked. When you can’t secure the network any longer, what do you do? Shifting to a runtime protection approach will require a bit of retooling, but the end-result will be—finally—slowing the attacks that threaten every organization, every day.

Curiosity Didn’t Get the Best of Him; It Led to a Career

An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.

An Unexpected Champion in the Fight Against Identity Theft - The IRS

While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.

You Can’t Change The Future, But You Can Foresee It, and Be Ready

When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.

Knowledge, Passion, Determination and a Sense of Social Responsibility

Robert Simmons thinks of his mom and grandmother when defending all computer users from cyber threats that can strip them of their identities and money. This InfoSec professional believes a safe and level Internet playing field will be achieved by meticulously observing data patterns to illuminate the most dangerous network risks.

We Have No Choice. We MUST Make 2017 the Year of Cybersecurity

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.

Cybersecurity: Part Science, Part Business, and Part Psychic?

Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.

Cybercriminals Love Your Mobile Profile And Everything You Do

Communication service providers can protect consumers and their businesses by offering value-added security services can help combat malware threats for users.

Just Like Santa’s Workshop, CyberSecurity Is Not a Seasonal Gig

Now that the holiday shopping season is here, it’s a good time to step back and think about how retailers are protecting shoppers’ valuable information. Don't be fooled, however, cybersecurity is an all-season activity.