Uncategorized

Are mobile devices insecure by nature?

It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have [...]

By | 2018-01-19T18:03:30+00:00 January 19th, 2018|Uncategorized|0 Comments

Report: Only 40% of data stored in cloud secured with encryption, key management

Organizations globally lack clear policies around securing data in the cloud, according to Gemalto and the Ponemon Institute. https://www.techrepublic.com/videos/business-leaders-must-change-their-security-posture-to-remain-safe-in-the-cloud/ Only 40% of the data stored in the cloud is secured with encryption and key management solutions. — Gemalto and Ponemon Institute, 2018 Only 25% of IT workers and security practitioners report being "very confident" they [...]

By | 2018-01-17T19:36:25+00:00 January 17th, 2018|Uncategorized|0 Comments

How to make stealing online credentials more difficult for cybercriminals

Victims of phishing are 400 times more likely to be successfully hijacked compared to a random Google user, according to researchers. Find out the most effective ways to mitigate credential theft. https://www.techrepublic.com/videos/phishing-attacks-remain-a-top-tactic-for-targeting-cyberattacks-at-business/ Theft of credentials, especially information providing access to online accounts, is reaching epidemic proportions. Case in point, the [...]

By | 2018-01-15T20:21:17+00:00 January 15th, 2018|Uncategorized|0 Comments

Encrypting communication: Why it’s critical to do it well

Encryption is essential for securing data, either in transit or stored on devices. It can provide piece of mind that communications will not be intercepted and that sensitive information stored on devices can't be exfiltrated in the event of loss or theft. The value of encryption extends beyond proactive safety, as many organizations are obligated [...]

By | 2018-01-10T21:00:03+00:00 January 10th, 2018|Uncategorized|0 Comments

Don’t forget to go the ‘last mile’ on cybersecurity initiatives

Cybersecurity pros, resolve to always go the last mile when it comes to information security. Here are questions that can help with this crucial part of the process. https://www.techrepublic.com/videos/video-how-to-overcome-employee-resistance-to-new-cybersecurity-policies/ For more than a decadeI have Advised  executives in government, the private sector, and at nonprofits on communicating about the risks of cyberattacks, terrorist attacks, and natural [...]

By | 2018-01-10T20:54:48+00:00 January 10th, 2018|Uncategorized|0 Comments

Why your next contactless credit card might have a fingerprint scanner built-in

Contactless credit cards that utilize biometrics, like one recently launched by Gemalto, may help prevent identity theft. https://www.techrepublic.com/videos/video-how-to-protect-your-company-from-internal-cyber-threats/ Building a slide deck, pitch, or presentation? Here are the big takeaways: Gemalto launched a contactless credit card that allows customers to make payments with a fingerprint sensor. The card may be the next level of secure [...]

By | 2018-01-09T13:50:02+00:00 January 9th, 2018|Uncategorized|0 Comments

Why cybersecurity in 2018 will be an AI vs. AI slugfest

Cybercriminals will soon rely on machine learning and other AI-based attacks to hammer corporate systems and imitate human behavior, says IBM Security's Caleb Barlow. https://www.techrepublic.com/videos/why-cybersecurity-in-2018-will-be-an-ai-vs-ai-slugfest/ In 2018, we will see a rise in artificial intelligence-powered cyberattacks. TechRepublic's Dan Patterson met with IBM Security's vice president of threat intelligence Caleb Barlow to discuss what this means [...]

By | 2018-01-09T13:41:54+00:00 January 9th, 2018|Uncategorized|0 Comments

Vocal disguises and impersonations may fool voice recognition authentication

Research indicates that impersonating a voice can fool voice recognition authentication systems. Multimodal biometric authentication might be a better security option. https://www.techrepublic.com/videos/cybersecurity-in-an-iot-and-mobile-world-3-big-factors/ Pundits predict that biometrics will eventually replace passwords as the preferred method of authenticating users. On the surface, using physical features instead of passwords seems like a win-win for everyone concerned. There is nothing to [...]

By | 2018-01-02T13:56:44+00:00 January 2nd, 2018|Uncategorized|0 Comments

Software updates for workstations and mobile devices: How to stay safe and sane

To maintain security for your organization, it's essential to have a plan in place that ensures all updates are applied to workstations and mobile devices. https://www.techrepublic.com/videos/video-predicting-2018s-biggest-cyber-threats/ With cybercrime on the rise, maintaining a regular schedule of updates and applying critical out-of-band patches as vulnerabilities are discovered are paramount to maintaining the integrity of security in [...]

By | 2017-12-29T21:48:09+00:00 December 29th, 2017|Uncategorized|0 Comments

Top five emerging cybersecurity trends for 2018

Netwrix sums up the top cybersecurity trends that will define the way organizations develop their IT strategies in the coming year. Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid environments, outlines the top 5 emerging IT security trends likely to affect the way organizations will approach cybersecurity [...]

By | 2017-12-27T22:31:43+00:00 December 27th, 2017|Uncategorized|0 Comments