Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems

By 2020, the very foundations of today’s digital world will shake. Nation states and terrorist groups will increasingly weaponize the cyber domain, launching attacks on critical national infrastructure that cause widespread destruction and chaos. With power, communications and logistics systems down, organizations will lose the basic building blocks needed for doing business. Heating, air conditioning, lighting, transport, information, communication and a safe working environment will no longer be taken for…

July 3, 2018
Read More >>

Navigating Dangerous Waters: the Maritime Industry’s New Cybersecurity Threat as Technology Innovation Grows

The rapid evolution of technology and, in particular, the Industrial Internet of Things (IIoT) is transforming critical environments, bringing benefits such as optimised processes, reduced costs and energy efficiencies. The maritime industry, which forms part of our critical infrastructure, is adapting to access many of the benefits that innovation in technology can offer. By the end of the decade, for example, a new era of shipping will have started with…

July 3, 2018
Read More >>

Is User Training the Weakest Link for Your Email Security Approach?

The days of only deploying an email security gateway to block viruses, spam and other threats from reaching user email accounts are gone. Even though gateways no doubt have their place in a comprehensive security strategy, in most cases they are paired with supplementary technologies to ensure the most effective layered email protection. This is critical because gateways aren’t designed to sniff out attacks such as social engineering, phishing, spear…

June 28, 2018
Read More >>

Least Privilege Access – Still at the Front Lines of Security

Ever since authentication and authorization became the norm for access to computer systems, the principle of least privilege (POLP) has been the de-facto baseline for proper security. At its very core, least privilege access means granting a user just enough permissions (authorization) to access the data and systems in their company’s enterprise necessary to do his or her job – nothing more, nothing less. In theory, adhering to the POLP…

June 27, 2018
Read More >>

“Can you Hear Me Now?” – Security Professionals Warn about Who May Be Listening

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users. While in the past, companies and app makers used different technologies on mobile devices in order to gather more and more data it is becoming more attractive for unethical hackers to find a way in for malicious purposes. In one case, the company ‘La…

June 27, 2018
Read More >>

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

Years ago, senior managers of large organizations and enterprises were primarily preoccupied with growing their businesses, forming strategic alliances and increasing revenue. Security, mostly left to IT departments, was usually regarded as a set-and-forget solution that was in place for either compliance purposes or to prevent permanent damage within the organization’s infrastructure. Fast forward several years, and organizations have woken up to the cold reality of data breaches, malware outbreaks,…

June 18, 2018
Read More >>

4 Cybersecurity Tips for Staying Safe During the World Cup

The World Cup is only days away and everyone is on their way to Russia or simply planning when they will stream the games they care most about online. When it comes to traveling, it is critically important to know how cyber criminals target their victims, what travelers can do to reduce the risk, and ways to make it more challenging for attackers to steal their important company or personal…

June 13, 2018
Read More >>

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

Beginning in the 1950s, artificial intelligence (AI) was used as an umbrella term for all methods and disciples that result in any form of intelligence exhibited by machines. Today, nearly all software in every industry – especially in security – use at least some form of AI, even if it is limited to basic manually coded procedures. ESG research found that 12 percent of enterprise organizations have already deployed AI-based…

June 13, 2018
Read More >>

Building a Strong, Intentional and Sustainable Security Culture

Here is the big idea: your security culture is – and will always be – a subcomponent of your larger organizational culture. In other words, your organizational culture will “win out” over your security awareness goals every time unless you are able to weave security-based thinking and values into the fabric of your overarching organizational culture. But how do you achieve this to ultimately build a strong, intentional and sustainable…

June 11, 2018
Read More >>

The 3 Must Knows of Sandboxing

Sandboxes have been touted as a high-ranking method to prevent a cyber-attack on organizations because they allow you to test everything before it can affect your production environment. But does that come with a cost and are they as effective as vendors would like us to believe? Play Time in the Sandbox? Most of us know a sandbox as a fun place that children play in at the playground. Similarly,…

June 4, 2018
Read More >>