cybercriminals

Cybersecurity Needs Technologists? Are You One Of Them?

How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.

Seriously?! Can You Not Do That? Chapter V - Careless/Misuse of Corporate Email

Every company uses e-mail to communicate, but few understand that this type of unstructured data needs to be protected. Considering that over 90% of attacks start with e-mail yet only 43% of IT professionals see projects involving unstructured data as a top priority, it’s not surprising that these attacks can cause significant financial damage. Here’s how companies can safeguard against this risk.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

Cybercriminals Make a Lot of Money. Because it is Too Easy

A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.

Cyber Threats Have Evolved. How About Your Insurance?

Great advancements have been made in cyber risk insurance since the first policies were introduced nearly two decades ago. Options available in 2017 offer organizations the ability to not only survive a data breach but the resources and finances to swiftly take it head on and win. Cyber threats have evolved but has your approach to insurance?

An Unexpected Champion in the Fight Against Identity Theft - The IRS

While the US has been slow to legislate meaningful ID protection safeguards, an unexpected agency is taking a leadership position - The IRS.

You Can’t Change The Future, But You Can Foresee It, and Be Ready

When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.

Knowledge, Passion, Determination and a Sense of Social Responsibility

Robert Simmons thinks of his mom and grandmother when defending all computer users from cyber threats that can strip them of their identities and money. This InfoSec professional believes a safe and level Internet playing field will be achieved by meticulously observing data patterns to illuminate the most dangerous network risks.

We Have No Choice. We MUST Make 2017 the Year of Cybersecurity

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.

Cybersecurity: Part Science, Part Business, and Part Psychic?

Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.

Cybercriminals Love Your Mobile Profile And Everything You Do

Communication service providers can protect consumers and their businesses by offering value-added security services can help combat malware threats for users.