March 16, 2020 | Bindu Sundaresan

Do you have the GRIT to be a cybersecurity consultant?

As I read Angela Duckworth's GRIT, where she explains that the secret to outstanding achievement is not talent but a unique blend of passion and persistence she calls "grit," I was able to relate the need for this power of passion and perseverance to be a successful cybersecurity professional and more importantly a trusted cybersecurity consultant. It takes a…

March 12, 2020 | Devin Morrissey

Malicious Actors and Medical Data: Where Are We Heading?

Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are most interested in: your medical data. Whereas a credit card number or Social Security number can net a criminal $1-$15 depending on the data type, medical records can sell for the equivalent of $60 each (in Bitcoin). What…

Get the latest security news in your inbox.

Subscribe via Email

March 9, 2020 | Karoline Gore

The rising threat of drones to cybersecurity: What you need to know

This blog was written by an independent guest blogger. The Federal Aviation Administration (FAA) reports that there are nearly 1.5 million registered drones in the United States, proving them to be ubiquitous across the country - and there are plenty that are still unregistered, too. From military use to consumers who buy them to start a new hobby, drones…

March 5, 2020 | John Ocampos

How to spot a fake app?

This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user increases, technologies, apps, and software are continually created for these devices. However, as people shift their use to mobile devices,…

March 4, 2020 | Deana Kovač

(Dis) Advantages of having your domain, email and website on separate providers

This blog was written by an independent guest blogger. Thinking about launching a new website? You’ll want a domain to go with that, as well as a brand spanking new email address. But here’s the thing: Before all the fun and excitement of creating a new website can begin, you first have to decide whether or…

March 2, 2020 | Sam Bocetta

How a small business can achieve Zero Trust security

Contrary to popular belief, small businesses don’t need to be restricted by their budgets and productive capacity - especially when it comes to security. By using the right Zero Trust approach, businesses can prevent data breaches, all while continuing to grow. New technologies such as databases, the cloud, the internet-of-things, and countless network devices help a business save…

February 27, 2020 | David Smith

Online payment security: 8 Steps to ensure safe transactions

This blog was written by an independent guest blogger. Online shopping has become an increasingly popular trend in the past few years as people find it more convenient to buy from the comfort of their homes. You can get pretty much anything and everything from online stores: groceries, clothing, jewelry, electronics and other household items. Yet, we need to consider…

February 25, 2020 | Kim Crawley

How to harden your employees from the massive social engineering threat

This blog was written by an independent guest blogger. Social engineering is the art of human deception. In the world of cybersecurity, it’s how to fool human beings in order to conduct cyber attacks. Some of these cyber attacks can be very expensive to your business! In fact, many of the worst cyber attacks to your organization&rsquo…

February 24, 2020 | Bindu Sundaresan

Dawn of a new decade: Leaping from GRC to IRM - A building block approach

This blog was co-authored by Carisa Brockman, GRC Practice Lead. First things first: It is crucial to understand the difference between Governance, Risk and Compliance (GRC) and Integrated Risk Management (IRM) because this sets the stage for long term strategic risk management and breaks down the siloed approach to risk that exists in many organizations today.  It is because…

February 20, 2020 | Kim Crawley

Is the cybersecurity skills gap real?

An independent guest blogger wrote this blog. If you do a web search for “cybersecurity skills gap,” you’ll get many, many pages of results. It’s certainly a hot topic in our industry. And it’s a matter that security practitioners and human resources people often disagree on. But before I get further into…

February 19, 2020 | Chris Mark

Understanding cyber attacker motivations to best apply controls

Implementing a risk based security program and appropriate controls against adaptive cyber threat actors can be a complex task for many organizations. With an understanding of the basic motivations that drive cyber-attacks organizations can better identify where their own assets may be at risk and thereby more efficiently and effectively address identified risks.  This article will discuss the Rational…

February 18, 2020 | Zachary Curley

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending the same diligence towards their third-parties. Organizations end up trusting the security of their network and data to an unknown…

Watch a Demo ›
Get Price Free Trial