How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.
Every company uses e-mail to communicate, but few understand that this type of unstructured data needs to be protected. Considering that over 90% of attacks start with e-mail yet only 43% of IT professionals see projects involving unstructured data as a top priority, it’s not surprising that these attacks can cause significant financial damage. Here’s how companies can safeguard against this risk.
Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.
A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.
Want to learn why the $100 million attack on two U.S. Tech companies will accelerate the adoption of machine learning for information security? Then read this Experts Corner from InfoSec expert, Eyal Benishti.
Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?
2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. In this Experts Corner, Chuck Brooks pulls together a collection of links highlighting some of the more alarming cybersecurity statistics.
While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.
When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.
Robert Simmons thinks of his mom and grandmother when defending all computer users from cyber threats that can strip them of their identities and money. This InfoSec professional believes a safe and level Internet playing field will be achieved by meticulously observing data patterns to illuminate the most dangerous network risks.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.
Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.
Communication service providers can protect consumers and their businesses by offering value-added security services can help combat malware threats for users.