• Sep 13
    2018
    From your thermostat and refrigerator to your television and watch, every household item seems to be smarter nowadays thanks to the Internet of Things. As these devices become more and more popular, hackers have and will continue to search for ways to compromise these connections. This means that the need for constant vigilance and awareness of cybersecurity is more important than ever. With that being said, do you know where ...
  • Aug 21
    2018
    Every day that goes by means that cyber threats are growing in intensity, danger, and frequency. It is the unfortunate truth that organizations are failing to keep up with these new threats as they continually struggle with new and increased regulations, a terrifying skills shortage, and new innovative cyberattack methods. If the next few years are anything like the past few have been, we will find ourselves in a hyper-connected ...
  • Jul 24
    2018
    You could put millions of dollars into software and systems to help protect your company from every known cyberattack method out there and still have a data breach occur. How could this possibly happen? The answer comes down to simple human error. There is not a single firewall or system that can prevent a human from clicking on a phishing link, losing an unsecured company cell phone or tablet, or ...
  • Jul 20
    2018
    The first six (almost seven) months of 2018 have thankfully been a bit quieter in terms of global ransomware attacks and government leaks compared to last year, which is good news. Unfortunately, that’s where the good news stops when it comes to cybersecurity in 2018. In just the first half of this year, we have seen that critical security infrastructure is barely hanging on and state-based hackers are getting more ...
  • Jul 10
    2018
    Unfortunately, there seems to be a misconception that once a cyberattack occurs, there is not much that can be done to fight back against the attackers. This couldn’t be further from the truth. After a data breach or cyberattack descends on your organization, there are thankfully several active defense steps that you can take to minimize the amount of havoc caused by cybercriminals. These steps are focused on detecting attacks ...
  • Jun 26
    2018
    When was the last time you considered reviewing your company’s current cybersecurity strategy and plans? If you haven’t thought about it in a while, chances are that you are probably at risk. In this ever-evolving threat landscape, your organization cannot afford to sit and feel proud or complacent in the fact that your current cybersecurity strategy is good enough. Far too many companies believe that once these plans are made, ...
  • Jun 21
    2018
    Amey Varangaonkar| Packt Publishing One thing that every data professional absolutely dreads is the day their skills are no longer relevant in the market. In an ever-changing tech landscape, one must be constantly on the lookout for the most relevant, industrially-accepted tools and frameworks. This is applicable everywhere – from application and web developers to cybersecurity professionals. Not even the data professionals are excluded from this, as new ways and ...
  • Jun 14
    2018
    The World Cup is a great example of an event that inspires awe, national pride, and excitement in people from countries all over the world. While these events are typically focused on physical security, the need for increased cybersecurity efforts should not be overlooked. If you have traveled to Russia to experience the World Cup in person or are out traveling the world for any other reason, you must not ...