While there are a number of great points in the article, there is a key consideration that cannot be overlooked during compliance audits – the difference between what should be…
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why…
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to…
Mergers and acquisitions (M&As) are a critical part of doing business in our modern, hypercompetitive world. Of all the factors that go into the valuation of a deal, cybersecurity occupies…
{JJM}There are strong cases to be made that by empowering developers to scan their code as often as they want, the number of vulnerabilites drops significantly.
The Problem With The Industry Analyst
Thoughts on the damage caused by Research Firms to the Information Security field and why the role of the Industry Analyst must change.
Disclosure 2020: Grugq’s Opening Keynote ‘Strategic Cyber Warfare’
Chinese cyber power is neck-and-neck with US, Harvard research finds
zBang – Privileged Account Threat Detection Tool
How CISOs Can Expand Their Security Duties into Industrial Environments
Why Organizations Need Manual Penetration Testing
Understanding and Executing Compliance Audits
While there are a number of great points in the article, there is a key consideration that cannot be overlooked during compliance audits – the difference between what should be…
Cybersecurity Career Path: A Beginner’s Guide
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why…
Information Security: Corporate-Owned Devices Vs Employee-Owned Devices
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to…
5G technology predictions 2020
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions Corporate security prediction 2020 Cyberthreats to financial institutions 2020: Overview and predictions It…
7 Considerations Before Adopting Security Standards
Here’s what to think through as you prepare your organization for standards compliance.
Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist
Mergers and acquisitions (M&As) are a critical part of doing business in our modern, hypercompetitive world. Of all the factors that go into the valuation of a deal, cybersecurity occupies…
How Will 5G Deployment Impact Smart Cities?
5G technology is fast — I mean, really fast. I didn’t realize just how far ahead of 4G technology it was until I visited a vendor booth at a recent…
A Realistic Threat Model for the Masses
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here’s why.
Threat Research Report: The State of Cryptomining
A fantastic detailed write-up of the State of Cryptomining. – JJM
How Human Security Investments Created a Global Culture of Accountability at ADP
Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets
How To Prevent SQL Injections? (Complete Guide)
Crypto-Risk: Your Data Security Blind Spot
How To Fix ‘The Site Ahead Contains Malware’ Error On A WordPress Site?
{JJM} A useful primer for those who are dealing with the rash of Magecart attacks.
To Scan or Not to Scan? Why Frequency Matters for DevSecOps
{JJM}There are strong cases to be made that by empowering developers to scan their code as often as they want, the number of vulnerabilites drops significantly.
Protect Your Enterprise From BGP Route Hijacking
{JJM} Yet another… we need to do the basics right…
What the NIST Zero Trust Architecture Means for Business Continuity
Microsegmentation architecture choices and how they differ
5G Technology: How to Make Sure the Benefits Outweigh the Security Risks