Cyber Security Is A Business Risk, Not Just An IT Problem

Gone are the days when companies could pass the headaches of cyber security to the IT department, as it has become more of a business issue too. This is especially important as businesses are more digitized, meaning they are exposed to an increasing number of threats if they do not manage the risk of security […]
Read More »

Cybersecurity Takeaways: Assess Yourself, Protect Yourself

Massive data breaches leave individual consumers feeling powerless. Sophisticated phishing attacks make the “foreign-born prince” email scams of just a few years ago seem quaint. On social media and beyond, questions of what’s real, what’s fake and whodunnit are going through a cyber-shakeout nationally and globally. “It’s like the old ‘Spy v. Spy’ cartoons,” said […]
Read More »

More IT Professionals Turn to Cybersecurity Roles

While more U.S. IT professionals are pleased with their jobs, a new report reveals that just over half of them are interested in careers in cybersecurity. Good thing, too. Of the 6 million open technology jobs in the United States, 2 million are in cybersecurity, said Edie Fraser, founder of the Washington, D.C.-based consultancy STEM […]
Read More »

Cybersecurity: Why it’s “hard to protect yourself” online

Governments have fallen victim to a string of high-profile cyberattacks in recent years. German IT expert Sandro Gaycken tells DW about cybersecurity’s shortcomings and why he thinks Kaspersky did not work with Russia. DW: At the end of October, a new virus called “BadRabbit” attacked computer systems in Russia, Ukraine, Germany and other countries. Among […]
Read More »

Cybersecurity is becoming a problem people can’t ignore, hackers say

People often pay more attention to the benefits of modern technology than its problems — in part because so far, the consequences have been tolerable, experts said during a Chicago Ideas Week event Thursday. “That’s changing,” said Joshua Corman, founder of I Am The Cavalry, a grassroots organization focused on computer security and how it […]
Read More »

Cybersecurity threats create career opportunities

Early on July 4, hackers redirected traffic from Stearns County’s website to a site that claimed to be “testing some tricks.” A similar hack happened two days later in Leon County, Florida. In the aftermath of both breaches, employees from both county’s information services departments worked tirelessly to analyze the threat and prevent future ones. […]
Read More »

Accenture latest firm caught with lax cybersecurity

Accenture have become the latest major cybersecurity provider to be left red-faced regarding their own security. While it appears that major damage was averted, Accenture reportedly left a large cache of sensitive information without password protection on their cloud storage. Cybersecurity has become one of the hot topics for businesses around the world. In the […]
Read More »

How to sell cybersecurity to your executive team

It’s a constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line. Despite the headlines, growth-oriented executives tend to prioritize other expenses. Despite repeated major, high-profile breaches, most cybersecurity teams still struggle to get sufficient funding. “After this hack, cybersecurity budgets are bound to increase.” We’ve all thought it. But, […]
Read More »

5 questions to ask your CEO about cybersecurity

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to […]
Read More »

The Future of Cybersecurity Part II: The Need for Automation

The growing complexity (Part 1) of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security […]
Read More »