Category

Blog
The growing number of privacy and data breaches and ransomware attacks making the daily news serve as a cautionary reminder for companies to treat cybersecurity as a top priority.  As companies undergo digital transformation and enjoy the benefits of enabling technology, they are also inevitably exposed to cyber risks. This is simply a reality of...
Read More
Missed out on the RSA 2018 Conference? If you missed out on the 27th annual RSA conference in San Fransisco, fear not. There’s always next year. In the meantime, you can catch up on some of the event highlight reels and speaker sessions and presentations available on YouTube and the RSA conference website (see links under...
Read More
CSIRP - cybersecurity computer security incident response plan
You’ve been breached. Now what? Aside from preventing security incidences, a top challenge IT professionals face is planning and preparing to respond to a cyber security incident.  Security professionals shoulder a mountain of responsibility working to protect their organization’s assets. Between protecting people, digital assets, physical infrastructure, and ensuring regulatory compliance, there is much to...
Read More
Why Passwords Alone Are Not Enough Believe it or not some people – in fact many people – are still using terrible passwords to “secure” access to their personal and business accounts.  The purpose of passwords is to prevent unauthorized access to your accounts.  By now, most of us know that using strong passwords, that is,...
Read More
Healthcare Entities Must Consider The Consequences Of Not Making Cyber Security A Top Priority Cyberattacks against the healthcare industry are on the rise and barely a week goes by without news of a patient data breach or attack on a hospital or healthcare provider. With healthcare organizations embracing new technologies and digitizing their operations to improve...
Read More
Zscaler IPO: Celebrating A Major Milestone Cloud security company Zscaler, Inc., celebrated a major milestone on Friday, March 16, 2018 making its debut on the Nasdaq. The now publicly traded company (under the symbol ZS) develops a software-as-a-service based cloud security platform that secures access for users and devices to internet applications. The Zscaler IP is...
Read More
Vulnerability Risk Management: A Top Security Challenge And Priority There are more devices connected to the internet than ever before and the number of connections is growing daily at a phenomenal rate. The overall Internet of Things (IoT) market is projected to be worth more than one billion U.S. dollars annually from 2017 onwards. As...
Read More
CrowdStrike Global Threat Report Latest Report Reveals Cyber Trends and Predictions The volume, intensity and sophistication of cyberattacks has hit new highs and cyber adversaries can launch massive, destructive attacks rendering organizations inoperable for days or weeks, according to the latest Crowdstrike Global Threat Report. So, what makes these attacks so effective?  They are essentially...
Read More
Technology and Cyber Security Priorities in The U.S. In last week’s blog post we looked at the United States’ commitment to combating cyber-risk and were encouraged to see the U.S. ranked second out of 193 countries in terms of highest commitment to cybersecurity (2017 Global Cybersecurity Index). But, which U.S. State’s are treating technology and...
Read More
Cyber Readiness of The U.S. Cyber risks are growing, both in their prevalence and in their disruptive potential, as individuals, companies and government agencies become increasingly more dependent on technology.  New and more sophisticated threats continue to emerge with cybercriminals using artificial intelligence and machine learning to conduct attacks.  In addition, the explosive growth of...
Read More
1 2 3 4 5 6