The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Cybersecurity Training Options
Cybersecurity training is essential to the development of the cybersecurity industry at large, as well as an essential practice to ensure our countries’ safety. In a world where cyber-attacks target our government, our businesses, our identities,
Bringing Your Phone Into Work Could Cause a Data Breach
The biggest danger factor regarding remote storage is the uptick in people bringing their personal devices into work and connecting to the server…
Data Breach Hits Equifax – Sometimes a Press Release Isn’t Enough
Ever since the Facebook data breach debacle, there has been a close eye on companies regarding how they deal with data breaches. Though many examples through the past few months could serve to illustrate…
Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy
An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…
The Value of a Cybersecurity Degree – Should You Get One?
Here’s an alarming statistic – more than one third of people in the United States have experienced being hacked, being infected with a cyber virus, or being the victim…
WhatsUp with WhatsApp?
Over the weekend, we were alerted to a significant spike from normal baseline of Twitter links being shared in terrorists WhatsApp group channels…
Facebook Terrorist Propaganda
Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…
Mitigate the Risk – Avoiding Serious Business Software Interruptions with an Escrow Agreement
No one can deny the dire need for software in business today. Companies are becoming increasingly dependent on software that is hosted by a third party and is consequentially outside of their control. But…