Cyber Security
Cyberchology: Psychometric Tests are a Key Weapon in Battle Against Cybersecurity Breaches (IA)
Cyberchology: Could psychometric tests lessen vulnerability to cybersecurity breaches? New research reveals different personality types have different susceptibilities to cybercrim... More
Protecting Smart Cities (TechNative)
The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More
4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)
Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More
Survey’s Surprise Finding: Only Half of Organizations Believe They Can Stop Cyberattacks (DXC Technology Blog)
If they are being honest with you, any CISO will tell you that they are well aware of the fact that their organization can be breached. None, at least none that I know, would conte... More
The Importance of Training: Cybersecurity Awareness as a Firewall (Forbes)
The top funding priorities for chief information security officers (CISOs) in the coming year reveal a fundamental challenge facing enterprises today: They need more talent, and th... More
Staying Ahead of Insidious New Breeds of Cyberattacks (Digitalist)
The whole industry of cybercrime has become increasingly sophisticated, not to mention far more comprehensively funded. There are several new breeds you might not be aware of.... More
Why You Should Make Cybersecurity a Company Culture and How to Do It (Forbes)
Cyberattacks though commonly reported as sophisticated, often are not. They are surprisingly simple and usually financially motivated. It seems so often that the media report that ... More
Artificial Intelligence: A Tool or a Threat to Cybersecurity? (ReadWrite)
Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsi... More
The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters (Security Intelligence)
Looking back at the most central characters, each brought their own unique set of skills and expertise to the Enterprise. This range of capabilities mimics the multifaceted role of... More
Box Shield Debuts With Increased Security Controls, Threat Protection (TechCrunch)
Box has always had to balance the idea of sharing content broadly while protecting it as it moved through the world, but the more you share, the more likely something can go wrong,... More
How Video Became a Dangerous Delivery Vehicle for Malware Attacks (Security Intelligence)
Most employees have some awareness about malware attacks. Many probably know that you should never open an executable file from a stranger or install a thumb drive found in the par... More
Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)
Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More
DXC Technology Extends Service Management, Security Operations Capabilities With Acquisition of Syscom (CDSA)
DXC Technology announced the acquisition of Syscom, a leading ServiceNow partner, to extend the reach and scale of its security operations and service management capabilities. The ... More
EY Report: Cybersecurity Concerns Prevent Companies From Adopting New Technology (UK Tech)
A new report published by EY shows that over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster.... More
Has Your Business Considered Biometric Security? (Tech HQ)
Biometric security is often hailed an immutable solution in an age under the constant shadow of cybersecurity risks. A combination of technology and the verification of unique, phy... More
Securing and Protecting Your IoT Network (TechGenix)
Even the slightest misconfiguration or poor security practices can serve as a point of entry for cyberattacks, security breaches, and data theft. Since IoT is a network of connecte... More
Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)
IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More
Cybersecurity: 3 Ways CXOs Can Guard Against Insider Threats (TechWire Asia)
Insider threats have always posed quite a challenge to cybersecurity specialists looking to defend a company’s data and infrastructure. In the digital world, while external attac... More
Cybersecurity and Economic Uncertainty (Tech HQ)
Can society live with constantly compromised data? It’s a valid question because there’s every indication that we are doing so currently, and will continue to do so.... More
Identity Management is Coming to the Internet of Things (DXC Technology Blog)
The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonab... More