Cybersecurity

 
 
  • Clever New Twist In Phone Phishing

    A variation on the now common phishing scam, dubbed “vishing,” has until recently had a predictable modus operandi, beginning with a bogus phone call from what seems to be a familiar and plausible source, like a bank...

    • Posted 3 weeks ago
    • 0
  • Blockchain Technology In Mainstream Manufacturing

    Recent global surveys by PWC and Deloitte found that most executives think blockchain technology is “scalable” and that it will be disruptive, resulting in revolutionary changes in operations, and that it’s likely to reach the mainstream. Among...

    • Posted 3 weeks ago
    • 1
  • Proactive Approach To Data Protection

    Threat intelligence is a process of identifying and collecting data, and analyzing artifacts from the past to create an actionable plan for mitigating future threats. It is not about providing responses to a breach after the fact....

    • Posted 4 weeks ago
    • 0
  • The GDPR Six Months In

    The General Data Protection Regulation became enforceable on May 25, and it has rewritten the ground rules for many companies regarding how they acquire, store and manage information, as well as what they say about it to...

    • Posted 4 weeks ago
    • 0
  • Why Senior Executives Are Prime Targets For Cyber-Attack

    The valuable information they possess, plus the fact they have influence in their organizations, means that cyber-criminals get more “bang for their buck” when they go after the most senior executives. This post from CyberVista explains why...

    • Posted 4 weeks ago
    • 0
  • Drones Were Vulnerable To Data Theft

    Researchers at Check Point Technology discovered that an account takeover of commercial and consumer drones manufactured by the world’s leading drone vendor, DJI, could allow spying on enterprises, as well as hundreds of thousands of individuals. An...

    • Posted 4 weeks ago
    • 0
  • Share Prices Take Hit After A Data Breach

    According to an analysis conducted over several years, companies that suffer data breaches are likely to underperform on the stock market. The companies analyzed included Apple, JP Morgan Chase and Yahoo. Share prices hit a post-breach low...

    • Posted 1 month ago
    • 0
  • Pentagon Hires More White-Hat Hackers

    The Pentagon, expanding a bug-bounty program it started two years ago, has awarded contracts to three private security firms, all of them relatively new crowdsourced Silicon Valley companies. This partnership allows “vetted hackers to simulate real and...

    • Posted 1 month ago
    • 0
  • 3.5 Million Unfilled Cybersecurity Jobs By 2021

    Budgeting for cybersecurity needs is hard now, but it will soon be a lot harder. There is a critical shortage of talent, and unlike the economy as a whole, organizations with security needs are responding the old...

    • Posted 1 month ago
    • 0
  • Firewalls And Why Your Organization Needs One

    Effective firewalls are the first line of defense against a system breach, and having one is considered a minimum security standard by regulators, among others, for any company that handles personal information. This post explains what a...

    • Posted 1 month ago
    • 0