phishing

Our Best Cyber-Defense For The Future: Teenage Technologists

Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.

Would You Steal Data That Cannot Be Used?

From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?

Cybersecurity Needs Technologists? Are You One Of Them?

How can U.S. companies possibly narrow a tremendously cavernous skills gap in the world of IT security? Social innovation executive and author, Charles Eaton, believes one viable solution is now wending its way through our nation’s middle and high schools. In this 5-part series, Eaton delves into the five keys for “Raising the Next Generation of Technologists” and filling the cybersecurity skills gap in the process.

Looking for a new job? Then the scammers want you!

If you're a big company and you're not looking for imposters, you're making a big mistake. If you, as an individual, get a job offer emailed to you out of the blue apparently from a big company, it's pretty much a certainty you're going to loose out big time if you get "employed." Read Mark Gibbs' latest Gearhead column to learn why.

How To Stay Cybersecure This Summer Vacation

Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.

Your Organization's Greatest Threat? It's Bob.

You know Bob who works for your organization? That's right, Bob, the CFO. Nice guy. Organized, always on time, gets the job done. Good guy (except when he got tanked at the Christmas party but let's not talk about that). Well, there's something you might not know about Bob: He's incredibly dangerous to your business. 

Balancing Security and Privacy in the Enterprise

Enterprise security teams have a namesake job to do – secure their organizations – but it does not have to come at the expense of their colleague’s privacy. How, then, do organizations balance the requirements and expectations of both sides and keep their data secure while ensuring that the company refrains from violating privacy laws?

Not 100% Sure It’s Grandma? It’s probably Phishing

Could you spot a phishing attack if and when it crosses your inbox? What about your colleagues? Your executive staff and mangers that hold the keys to the kingdom? Read on to explore the anatomy of a phishing email and how to avoid falling prey to these attacks.

The 5 Best Defenses Against Ransomware Are Aggressive Offenses

The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.

Your Personal CyberSecurity Needs You. Learn How To Enhance Your iPhone Security

What are some easy ways to enhance your iPhone security? Readers will learn how to protect their iPhones and the sensitive information that can be stored on these devices.

Knowledge, Passion, Determination and a Sense of Social Responsibility

Robert Simmons thinks of his mom and grandmother when defending all computer users from cyber threats that can strip them of their identities and money. This InfoSec professional believes a safe and level Internet playing field will be achieved by meticulously observing data patterns to illuminate the most dangerous network risks.

Who Are You to Ask Me Who I Am? Two Party Authentication is a Must

Ever get that feeling where the person on the other end of the incoming phone isn't who they claim to be? What about that time you needed to contact your bank so you click the link in the email to find the bank's number - ever wonder if it's a legitimate number? Maybe you should think twice. Twice authenticated, that is.

Curiosity Killed the Cat and Other Cybersecurity Horror Stories

When the weakest link in a business’ IT security is “end users who…are too easily fooled by social engineering attacks,” how do you protect your organization? Here are two studies that show just how foolish people can be.

The Anatomy of a Banker Malware - Unraveling Marcher

Mobile malware has already compromised sensitive military and business related information. Enterprises should take this threat seriously and close any gaps in mobile security to avoid breaches of sensitive information.

Expert Oren Koriat walks us through the Marcher banking malware.