Category

Security
Vulnerability Risk Management: A Top Security Challenge And Priority There are more devices connected to the internet than ever before and the number of connections is growing daily at a phenomenal rate. The overall Internet of Things (IoT) market is projected to be worth more than one billion U.S. dollars annually from 2017 onwards. As...
Read More
CrowdStrike Global Threat Report Latest Report Reveals Cyber Trends and Predictions The volume, intensity and sophistication of cyberattacks has hit new highs and cyber adversaries can launch massive, destructive attacks rendering organizations inoperable for days or weeks, according to the latest Crowdstrike Global Threat Report. So, what makes these attacks so effective?  They are essentially...
Read More
Technology and Cyber Security Priorities in The U.S. In last week’s blog post we looked at the United States’ commitment to combating cyber-risk and were encouraged to see the U.S. ranked second out of 193 countries in terms of highest commitment to cybersecurity (2017 Global Cybersecurity Index). But, which U.S. State’s are treating technology and...
Read More
Cyber Readiness of The U.S. Cyber risks are growing, both in their prevalence and in their disruptive potential, as individuals, companies and government agencies become increasingly more dependent on technology.  New and more sophisticated threats continue to emerge with cybercriminals using artificial intelligence and machine learning to conduct attacks.  In addition, the explosive growth of...
Read More
Cyber Security Education and How Your Employees Can Be a Company’s Greatest Asset or Risk Employees are at the heart of every business and can be a company’s greatest asset or its biggest threat when it comes to securing sensitive data and information. Lack of employee cyber security education and awareness, along with human error...
Read More
Holistic Cybersecurity Whatever industry you are in, regardless of business size, holistic cybersecurity must be considered a top priority and an integral part of the digital transformation journey. Most organizations are aware of the need to allocate resources to protect themselves from information security breaches, data loss, fraud, and financial loss and have focused on...
Read More
Third Party Risks There is a growing number of security threats linked to third party supplier and contractor access and over the last few years the media spotlight has shone on high-profile companies, such as Equifax, Yahoo, Target, Goodwill, Home Depot and Uber. The latest high-profile company to make media headlines is PayPal for a...
Read More
Cloud Security Companies are increasingly aware of the need for digital transformation and many organizations are rapidly adopting cloud computing. However, some companies are missing out on realizing the many benefits of cloud computing due to commonly held misunderstandings and misconceptions around deploying and running applications in the cloud, including cloud security. Cloud computing, which...
Read More
devices
The Growing Network Of IoT Connected Devices From a network of connected computers to a network with billions of connected endpoint devices, the internet is enabling inter-connectivity for a rapidly expanding array of things across all industries. It is not only just our desktop computers, laptops, smart phones and tablets that are connected to the...
Read More
ransomware key
BAD RABBIT, EXPETR MAKE YOU WANNACRY Two large-scale global ransomware attacks this year were the infamous global WannaCry and ExPetr (also known as Petya and NotPetya). The WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries. And now a third attack, dubbed “Bad Rabbit”, is on the rise. So what exactly...
Read More
1 2 3 4 5 6