Cyber Security
How Security Teams are Turning to Decoy Networks (Tech HQ)
In cyber deception, decoys and lures offer similar benefits in their use of camouflage to keep corporate networks and their information safe. This creates an advantage that other s... More
11 Eye Opening Cybersecurity Statistics for 2019 (CPO)
It is estimated that by 2027, global spending on cyber security will reach $10 billion. In this age of IoT, where there is no escaping the internet, it is very important to underst... More
Drafting an Appropriate Cybersecurity Policy (CPO)
Cyber threats, cyberattacks, and hacks are getting more and more common so companies are forced to invest in cybersecurity systems. Even though your business may have an excellent ... More
Pulling Strategic Value Out of Your Cyberthreat Intelligence Practices (Security Intelligence)
An increasing number of companies today depend on their cyberthreat intelligence practices to stay ahead of determined attackers and an ever-expanding attack surface. In fact, 72 p... More
How Artificial Intelligence Helps Bridge the Cybersecurity Skills Gap (Security Intelligence)
The widespread shortage of skilled security operations and threat intelligence resources in security operations centers (SOCs) leaves many organizations open to the increased risk ... More
Skills Gap in Cybersecurity Must be Addressed (Business Mirror)
The global community will need more cyber-security experts as challenges on cyber security are getting bigger and becoming more complicated, according to a top official at IBM. “... More
How Cybersecurity is Turning Users Into Security Experts (Forbes)
The reality is that the culture of internet has changed so rapidly over the past twenty-five years where security today is the primary concern for developers as opposed to the mid-... More
AWS Makes Control Tower, Security Hub Generally Available (Dark Reading)
At its first AWS re:Inforce conference, Amazon Web Services announced general availability for AWS Security Hub and AWS Control Tower. The services are intended to handle security ... More
In Security, It’s Usually the Basic Stuff That Gets You – Like Passwords (Digitalist)
There are some very smart hackers out there, many of whom have access to the latest techniques and exploits. But time and again, we’ve seen that attackers don’t need to deploy ... More
Akamai, DreamHack Team for Cybersecurity (CISO Mag)
DreamHack announced a new partnership with Akamai to jointly share data security insights along with analysis on the global gaming and eSports industry. Recently, Akamai published ... More
It’s Time to Start Thinking Like a Threat Hunter (Security Intelligence)
We hear it from our customers or in conversations at trade shows all the time: It would be great to hunt cyberthreats, but there is simply not enough time or resources to pull it o... More
Defending Critical Infrastructure Data Protects Your Bottom Line, the Economy (Illumio Blog)
The shipping and energy infrastructure around us can be pretty inspiring. It reflects years of labor by our men and women, the scale of our economy, the power of our ingenuity. If ... More
Cybersecurity Recruiting: Weigh Your Options to Find the Right Strategy (Forbes)
For chief information security officers (CISOs), finding cybersecurity talent is difficult and expensive. It can seem like the greater the need, the less available the talent is. T... More
Convergent Risks Announces ‘Demonstrating Privacy Compliance’ Initiative (CDSA)
Convergent Risks announced its ‘Privacy Control Framework & Requirements for Implementation’ initiative which provides a structure for managing personal data that a business ca... More
Is AI Fundamental to the Future of Cybersecurity? (CSO)
Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.... More
Microsoft: Changing Passwords No Longer Necessary (Verdict)
Microsoft has said that it no longer recommends periodic password changes, and that the practice could in fact leave users more open to hacking.... More
An Intelligence-Driven Approach to Cyber Threats (Help Net Security)
In the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvi... More
What is the Cybersecurity Tipping Point? (CMS Wire)
When it comes to security, our systems are now too complex to be successfully walled off from bad actors, and we need to adjust our approach if we want to keep innovating.... More
Smart Home Spending Will Triple by 2025, but Cybersecurity Fears Could Hold Market Back (Verdict)
Declining prices, access to 5G and increased awareness of the benefits of home automation will see the smart home market triple in value over the next five years.... More
LiveTiles Launches AI-Driven Data Security Solution with Microsoft (BNA)
Within weeks of becoming a launch partner for Microsoft's SharePoint home sites, Australian-founded LiveTiles has announced the launch of a new security platform for the Office 365... More