February 18, 2020 | Zachary Curley

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending the same diligence towards their third-parties. Organizations end up trusting the security of their network and data to an unknown…

February 13, 2020 | Bob Covello

InfoSec needs a reputation overhaul

An independent guest blogger wrote this blog. I was in a medical office the other day, and when the doctor came into the room, he needed to unlock his phone to contact a pharmacy.  I couldn’t help but notice that his home screen had a photo of an infant.  It was an adorable infant, and I…

Get the latest security news in your inbox.

Subscribe via Email

February 11, 2020 | Karoline Gore

New PayPal phishing scam seeks to go beyond login credential information

Photo by Kon Karampelas on Unsplash An independent guest blogger wrote this blog. Up until now, some of PayPal users’ greatest fears in terms of cybersecurity were phishing scams aimed at obtaining their login credentials. In January of this year, PayPal confirmed a high-severity bug affecting the login form, with PayPal security investigator, Alex…

February 6, 2020 | Devin Morrissey

Building comprehensive cybersecurity policies

Image Source: Photo by freestocks.org on Unsplash An independent guest blogger wrote this blog. When you think of cybersecurity, what’s the first thing to come to mind? Most of the time, it might be your business’s IT team, who run around worrying about updates, threats, and computing capacity. The reality is that cybersecurity isn&rsquo…

February 5, 2020 | Kevin Landt

10 things to know about cybersecurity in 2020

Cybersecurity talent is elusive, resources are dwindling, but hacks are on the rise. We’re addressing these challenges as “must-haves” as we kick off the year is essential to an organization’s cybersecurity strategy. Here are some of the 10 things to know about cybersecurity in 2020. (If  you’re interested in hearing more, register for…

February 3, 2020 | Randy Burkhead

NO FATE

“The future is not set, there is no fate but what we make for ourselves.” John Connor, Terminator 2 There is a prevailing viewpoint among security professionals that security breaches are inevitable. They have adopted the mantra, “It is not a matter of if but a matter of when.” As recently as the day I wrote this…

January 31, 2020 | Bob Covello

A new twist on “Parental consent”

An independent guest blogger wrote this blog. I was at breakfast the other day with some family friends, and the topic of genealogy came up.  Over the past few years, various sites have sprouted up that offer to trace your origins all the way back in time; in some cases, all the way back to the eras of early…

January 28, 2020 | Kate Brew

Do you need certifications to get an InfoSec job?

I’ve seen Tweets and heard many discussions about certifications, like CISSP, CEH, OSCP  and so on, in InfoSec. No doubt certifications have value – in many situations hiring managers are quickly going through resumes and certifications are symbolic of at least book-learning, and some degree of dedication to InfoSec. Certifications can be expensive and time consuming so having them clears…

January 27, 2020 | David Smith

How Smart Cards Work

An independent guest blogger wrote this blog. In this modern age, there’s been a significant improvement in the digitization of traditional payment methods. We live in a technologically advanced era, and as such, advancements in payment infrastructures makes life easier, transactions faster, swifter, and smoother. Almost all countries in the world are adopting the cashless economy policy. Smart cards…

January 23, 2020 | Devin Morrissey

Healthcare security: How can blockchain help?

This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone…

January 22, 2020 | Bob Covello

It is getting harder for us to prove who we are

I had an interesting experience the other day.  I had to renew my driver’s license.  In previous renewal cycles, this was no big deal.  One could just visit the local Department of Motor Vehicles (with a bagged lunch since it was usually a multi-hour wait), read an eye chart, take a horribly unflattering photo, and…

January 21, 2020 | Joe Gray

FUD-free analysis: Natural language processing (NLP)

If you follow me on Medium or Twitter, you may already be aware. Still, if you don’t (I assure you that you’re missing out), I have been researching several technologies in preparation for an OPSEC/Anti-OSINT tool that I am crafting. I am using this tool as a means to push myself harder…

Watch a Demo ›
Get Price Free Trial