encryption

Would You Steal Data That Cannot Be Used?

From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?

The Security Threat That Lies Ahead: Data Integrity

The Internet of Things (IoT) introduces a wealth of value as we look to make our digital lives more automated, streamlined, and easier. Unfortunately, with this value comes risk; risk that manifests itself not just in our personal lives, but in our professional business lives and in the industries and industrial settings that make it all possible. This article will cover the cybersecurity threats posed by data integrity in the era of IoT – particularly as it pertains to enterprise organizations and the industrial sector – and what organizations can do to mitigate the threats.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

The Far-Reaching Effects of a Malware Attack

When a company suffers a malware attack, the effects are widespread. Just how far, you ask? To help answer this question, expert Brian Laing explores this topic both far and wide.

A Dialogue With Joe Gray, Enterprise Security Consultant

ITSPmagazine recently caught up withJoe Gray, Enterprise Security Consultant at Sword & Shield Enterprise Security. Joe shared his views on personal information sharing, privacy, and the value of community service for information security awareness throughout society.

The Side Effects Of A Technology Craving Society - Part 1

We live in a technology-hungry society where consumers are accustomed to the convenience of technology without understanding the risks and vulnerabilities that come with it. In this part 1 of 2 InfoSec Life articles, Phil Agcaoili, CISO, discusses the five core issues of basic cyber hygiene.

Cybersecurity Tips For Financial Services Firms

There are some key things that a financial services firm needs to care about when it comes to security: Ashwin Krishnan offers his expert advice to help financial services firms develop their information security practice.

Your Blockchain Might Be Dead - and Alive - on Arrival

Government and business leaders in every corner are experimenting with blockchain solutions. But these projects face the risk of becoming dead-on-arrival if their designers fail to prepare for the looming threat of quantum computers.

No Worries, We Have the Biggest FireWall. Oh Look, a Pretty Horse, Bring It Inside!

There are plenty of security solutions designed to secure the fences that are the first line of defense in most organizations, but what about the threat from within? Expert Ameesh Divatia looks at why insider threats are the next big security challenge.

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

The Perpetual Tug-of-War Between Security and Convenience. What to Do?

Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?

Dodging SHA-1’s Collision Course

Security researchers at the CWI institute in Amsterdam working together with a team from Google found a practical way to compromise the SHA-1 hash algorithm. The goal of this post on ITSPmagazine is to explain the impact of this finding and what can be done to mitigate the risk.

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.

Shadow IT & Clouds. Let’s Minimize Risks & Enjoy the Benefits

With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.

What Could The Next Ransomware Note Say? Let’s Learn from 2016

When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.

Find What Matters to You and Fight for It

For many years Dinah Davis was afraid to speak up about bullying and discrimination. In the Equal Respect article, Dinah shares her experience of overcoming these issues to become a successful businesswoman in the field of cybersecurity.