September 10, 2020 | Mark Stone

Firewalls explained: the different firewall types and technologies

This blog was written by a third party author. Finding the right network security tools to secure your sensitive data can be a significant challenge for any organization. Choosing a firewall may seem like a simple task, but companies can get overwhelmed by the different firewall types and options. Making the distinction between a firewall and other security solutions can…

September 9, 2020 | Nahla Davies

What you need to know about securing your APAC business and the recent data law changes

Data breaches are growing in frequency and intensity amidst the recent Coronavirus pandemic, having increased by nearly 273% in the first quarter compared to the same time frame last year. In fact, 2020 may very well be remembered as the year when cybersecurity became a business problem rather than a technology issue. The driving factor here is the recent shift in workforce…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

September 9, 2020 | Mark Stone

What is Incident Response?

This blog was written by a third party author. As new types of security incidents are discovered, it is absolutely critical for an organization to respond quickly and effectively when an attack occurs. When both personal and business data are at risk of being compromised, the ability to detect and respond to advanced threats before they impact your business is…

September 8, 2020 | Kim Crawley

6 Crucial password security tips for everyone

This blog was written by an independent guest blogger. These days, everyone has passwords. Lots and lots of passwords! When I think of how many user accounts with passwords that I have, I probably have dozens. A few for social media platforms like Twitter and LinkedIn, a few for my favorite media streaming services, one for Nintendo Switch and another…

September 2, 2020 | Bernard Brode

How Covid-19 has increased vulnerabilities in Industrial Control Systems

This blog was written by an independent guest blogger. By now, most are aware that the Covid-19 pandemic has led to a spike in cyberattacks. This sharp increase in malicious activity related to COVID has taken the typical form of adversaries seeking to benefit financially, gain unauthorized access to networks for immediate and long-term strategic benefit, and spread misinformation with…

September 2, 2020 | Nick Cavalancia

Red Team testing explained: what is Red Teaming?

This blog was written by a third party author. In the world of cybersecurity preparedness, there are a variety of strategies organizations large and small can take to help protect their networks and data from cyber-attacks. One such strategy involves an organization testing its own environment for security vulnerabilities. But because security weaknesses come in different forms, it’s…

September 1, 2020 | Kim Crawley

PCI DSS logging requirements explained

This blog was written by an independent guest blogger. As a consumer, I feel more confident about using my credit card online and in brick-and-mortar stores when I know retailers are being careful about PCI DSS compliance. Breached financial credentials can wreak havoc not only on the lives of consumers, but also on the well-being of merchant businesses. I think…

September 1, 2020 | Nick Cavalancia

What is a cloud SIEM?

This blog was written by a third party author. Security information and event management (SIEM) solutions offer businesses the ability to collect, store, and analyze security information from across their organization and alert IT admins/security teams to potential attacks. In today’s complex digital environments, SIEMs allow IT teams to more effectively detect and respond to a…

August 31, 2020 | Devin Morrissey

Aviation cybersecurity: Hurdles of staying secure on the ground and at 36,000 feet

This blog was written by an independent guest blogger. Image Source: Pexels Digitization has made its way into every industry. With this shift comes many benefits as well as the risk of a cyber attack. This is especially true in aviation. No matter how securely companies can build networks to ward off cyber attacks, the risk is never absent. With…

August 26, 2020 | Bob Covello

Amazon scammers are becoming oddly specific

This blog was written by an independent guest blogger. A friend contacted me the other day about a scam call purporting to come from Amazon’s customer support department.  She wasn’t home at the time, so the scammer left a message stating that a charge of $749 appeared on her account.  Of course, she didn&rsquo…

August 26, 2020 | Mark Stone

IoT security explained

This blog was written by a third party author. The Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the internet to send and receive data without requiring human to computer or human to human coordination. The world of IoT encompasses a wide variety of technologies, vendors, and connectivity methods. While…

August 25, 2020 | Ericka Chickowski

Security risk assessments explained

This blog was written by a third party author. What is a security risk assessment? A security risk assessment is a formal method for evaluating an organization's cybersecurity risk posture. Comprehensive security risk assessments take stock in business objectives, existing security controls, and the risk environment in which the business operates. When done well, the assessment identifies security gaps…