Thwarting Server-to-Server Communications Spoofing
Your business name is Bob Knows Best with a domain name of BobKnowsBest.com. Your customers receive an email saying that there is a problem with their account at Bob Knows Best, directing them to visit...
View ArticleIs Big Data the Answer to Your Security Questions?
The year 2014 became known as the Year of the Hacker, even before it mercifully came to an end. In fact, many security experts predict that the trend will continue into this year and beyond. Isn’t it...
View ArticleHow to Provide Enterprise-Level Security to Cloud-Based Apps
Cloud-based apps are a must-have these days. Every business from your news channel to your bank to your video streaming service offers robust, highly functional mobile apps for customers to take...
View ArticleThe Top 8 Things to Know About Implementing BYOD Policies
The jury is in, and they have a verdict: whether you like it or not, BYOD is here and here to stay. Now that the ruling is out of the way, it’s time to set up solid policies to assure that the influx...
View ArticleIs the Tech Worker Labor Shortage Threatening Your IT Security?
For several years, rumors have abounded that there is a shortage of IT workers. Some say there is; others say there isn’t. But the reported shortage of qualified IT security personnel isn’t a false...
View ArticleWhat is the Next Generation Firewall? How Can You Choose One?
In the market for a new firewall? The next generation firewall (NGFW) is a distinct improvement over the previous generation for this era of Internet threats. Most businesses opt for a physical...
View Article4 Takeaways from the Recent Data Breach of US Government Security Agency
Today is not a good day to be an employee of the US federal government. One of the worst data breaches in history has compromised the private, sensitive information of at least four million, but...
View ArticleHealth-Related Data a Top Target for Hackers
Since September 2009, there have been 1,282 data breaches involving the healthcare community, according to the official figures of the US government. During these attacks, the private health...
View ArticleMalvertizing: What It is and What You Need to Know to Keep Your Network Secure
What happens when you wrap a zero day attack into a drive by download attack and load it into a Flash-based advertisement? The result is a malvertizement, and the instances of these threats has risen...
View Article5 Cyber Security Mistakes That Led to the Dow Jones Security Breach
In early October, publisher and financial news and information firm Dow Jones & Company announced that it was apparently the latest victim of hackers trying to steal sensitive consumer information....
View ArticleHactivism: What It is and How You Can Avoid Becoming a Target
New years are new beginnings. In our personal lives, that usually means rethinking and recommitting to goals like physical fitness, financial prosperity, and personal betterment in the form of more...
View ArticleRansomware: What You Need to Know to Secure Your Data Today
Each year, major cyber security companies and other industry experts release their predictions for the year ahead. These predictions include what attacks they expect to see most frequently, as well as...
View ArticleThe Pink Elephant in the Room: How IT Ignores Blatant Security Issues, Even...
What would happen if you completely ignored your car maintenance or home maintenance? What if you bought a car and drove it for years with no oil changes, no tire balancing and rotation, and never...
View Article4 Cyber Security Trends You Never Saw Coming
Most of the cyber attacks and data breaches you hear about are of the garden variety. The Sony hack, for example, and data breaches at Ashley Madison are the same types of threats we’re used to seeing....
View ArticleWhy the Future of Cyber Security Lies in Big Data & Artificial Intelligence
Just a cursory look around the world of cyber security is enough to deduce: we aren’t doing a good enough job. The cyber criminal organization Carbanak whipped up a concoction of malware that caused...
View Article