March 1, 2021 | Devin Partida

5 Cybersecurity concerns surrounding the COVID vaccine

This blog was written by an independent guest blogger. COVID-19 vaccines are starting to roll out after a year of grappling with the pandemic.  While this certainly inspires hope for the future, there are still risks on the road ahead. As distribution ramps up, vaccine-related cybersecurity concerns are also rising. Cybercrime has been a prominent side effect of the…

February 24, 2021 | Chris Mark

Quantifying CyberRisk- Solving the riddle

In the late 1990’s and early 2000’s there was a concept that was bandied about that was coined “Return on Security Investment” or ROSI.  Borrowing from the common business term Return on Investment (ROI) where a return on a particular investment (capital investment, personnel, training etc.) could be quantified, the cybersecurity industry attempted to quantify…

Get the latest security news in your inbox.

Subscribe via email

RSS

February 23, 2021 | Kate Brew

Cybersecurity and online gaming: Don’t be a victim

Theresa Lanowitz collaborated on this blog. Introduction The proliferation of technology and internet connectivity has made it possible for people to seek out most things online, and gaming and gambling are not exceptions. In addition to online video games, social media, music, and video streaming, there are also online casinos and gambling for real money. Well, for gambling in the…

February 17, 2021 | Mark Stone

What is an incident response plan? Reviewing common IR templates, methodologies

This article was written by an independent guest author. In today’s threat landscape, it’s no longer if an incident will happen, it’s when. Defending your organization and having a plan for what to do if an incident occurs is more critical than ever. And frankly, the benefits of having an incident response plan are…

February 15, 2021 | Theodoros Karasavvas

CISOs report that ransomware is now the biggest cybersecurity concern in 2021

This blog was written by an independent guest blogger. As the number of remote working arrangements rose substantially in the last year, cybercriminals were quick to take advantage of these new opportunities. Spam and phishing emails increased in number even more rapidly than telecommuting, and company cybersecurity officers found themselves struggling to keep up.  Phishing emails often came with…

February 11, 2021 | David Bisson

The Kubernetes API Server: Exploring its security impact and how to lock it down

This blog was written by an independent guest blogger. Organizations are increasingly turning to Kubernetes to manage their containers. As reported by Container Journal, 48% of respondents to a 2020 survey said that their organizations were using the platform. That’s up from 27% two years prior. These organizations could be turning to Kubernetes for the many benefits it affords them. As…

February 10, 2021 | Sam Meenasian

Budgeting in cybersecurity - Can businesses afford it?

This blog was written by an independent guest blogger. Creating an annual budget is challenging because business owners must consider all expenses in the coming year. Apart from ensuring that everyone is paid, and taxes are taken care of, cybersecurity should be one of the most important factors to consider. Even though there are many methods businesses can use to…

February 9, 2021 | Nahla Davies

Zero Trust policies - Not just for humans, but for machines and applications too

This blog was written by an independent guest blogger. Hackers are continually finding more and more pathways into an organization’s internal environment. Not only is access widely available, it can also be alarmingly simple. Rather than having to actively hack systems, hackers often just log in using easily-obtained or compromised user identities and credentials.  To avert these…

February 9, 2021 | Mark Stone

What is cybersecurity testing? Reviewing testing tools, methodologies for proactive cyber readiness

This article was written by an independent guest author. What does cybersecurity testing really mean? Your organization may boast all the best cybersecurity hardware, software, services, policies, procedures and even culture. If this is the case, you’re way ahead of the curve. But no matter how confident you are about your overall cybersecurity posture, how can you really…

February 8, 2021 | Mary Blackowiak

A beginner’s guide to SASE

If you are in the security or networking industry, there is no doubt that you’ve been hearing the latest Gartner inspired buzz word being dropped in conversations with your colleagues, customers, and vendors alike. In case you haven’t already guessed, I am referring to SASE (pronounced “sassy”). Although it is a hot topic of…

February 4, 2021 | Bernard Brode

Rooting out the cybersecurity risk in your CI/CD pipeline

This blog was written by an independent guest blogger. When it comes to productivity, agility, and efficiency - continuous integration/continuous delivery (CI/CD) pipelines are great. When it comes to ensuring cybersecurity, they leave a lot to be desired. In fact, and especially given the popularity of CI/CD pipelines now, securing continuous environments might turn into the most…

February 4, 2021 | Nick Cavalancia

Intrusion Prevention Systems explained: what is an IPS?

This article was written by an independent guest author. The goal of every cybersecurity strategy is to stop cyberthreats before they have a material impact. This has resulted in many organizations seeking to be more proactive in their response to potential threats by employing solutions to detect and prevent specific types of cyberattacks by monitoring for the earliest indicators of…