Understanding and Executing Compliance Audits
While there are a number of great points in the article, there is a key consideration that cannot be overlooked during compliance audits – the difference between what should be…
Cybersecurity Career Path: A Beginner’s Guide
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why…
Information Security: Corporate-Owned Devices Vs Employee-Owned Devices
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to…
5G technology predictions 2020
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions Corporate security prediction 2020 Cyberthreats to financial institutions 2020: Overview and predictions It…
7 Considerations Before Adopting Security Standards
Here’s what to think through as you prepare your organization for standards compliance.
Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist
Mergers and acquisitions (M&As) are a critical part of doing business in our modern, hypercompetitive world. Of all the factors that go into the valuation of a deal, cybersecurity occupies…
How Will 5G Deployment Impact Smart Cities?
5G technology is fast — I mean, really fast. I didn’t realize just how far ahead of 4G technology it was until I visited a vendor booth at a recent…
A Realistic Threat Model for the Masses
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here’s why.
Threat Research Report: The State of Cryptomining
A fantastic detailed write-up of the State of Cryptomining. – JJM
A Few Leadership Work-From-Home Tips
With so many people now being asked to work-from-home as part of the evolving COVAD-19 precautions, I figured it was worthwhile to put together a few tried-and-true practices to keep…
Overcoming crypto assessment challenges to improve quantum readiness
{JJM} I’ve been beating the drum about this for a while. As an industry, we need to consider how long it takes for us to find/replace the mountious number of…
How To Fix ‘The Site Ahead Contains Malware’ Error On A WordPress Site?
{JJM} A useful primer for those who are dealing with the rash of Magecart attacks.
To Scan or Not to Scan? Why Frequency Matters for DevSecOps
{JJM}There are strong cases to be made that by empowering developers to scan their code as often as they want, the number of vulnerabilites drops significantly.