Understanding and Executing Compliance Audits
While there are a number of great points in the article, there is a key consideration that cannot be overlooked during compliance audits – the difference between what should be …
Cybersecurity Career Path: A Beginner’s Guide
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why …
Information Security: Corporate-Owned Devices Vs Employee-Owned Devices
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to …
5G technology predictions 2020
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions Corporate security prediction 2020 Cyberthreats to financial institutions 2020: Overview and predictions It …
7 Considerations Before Adopting Security Standards
Here’s what to think through as you prepare your organization for standards compliance.
Why a Cybersecurity Assessment Needs to Be Part of Your M&A Due Diligence Checklist
Mergers and acquisitions (M&As) are a critical part of doing business in our modern, hypercompetitive world. Of all the factors that go into the valuation of a deal, cybersecurity occupies …
How Will 5G Deployment Impact Smart Cities?
5G technology is fast — I mean, really fast. I didn’t realize just how far ahead of 4G technology it was until I visited a vendor booth at a recent …
A Realistic Threat Model for the Masses
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here’s why.
Threat Research Report: The State of Cryptomining
A fantastic detailed write-up of the State of Cryptomining. – JJM
How To Fix ‘The Site Ahead Contains Malware’ Error On A WordPress Site?
{JJM} A useful primer for those who are dealing with the rash of Magecart attacks.
To Scan or Not to Scan? Why Frequency Matters for DevSecOps
{JJM}There are strong cases to be made that by empowering developers to scan their code as often as they want, the number of vulnerabilites drops significantly.
Protect Your Enterprise From BGP Route Hijacking
{JJM} Yet another… we need to do the basics right…
Are Job Interviews Broken?
{JJM} Great piece by a Warton organizational psychologist around how the hiring process is broken in almost every industry.