The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Addressing Cybersecurity Issues in Telehealth
The healthcare industry has been notoriously lackluster when it comes to cybersecurity for a long time now. The long story short is that doctors are more focused on caring for their physical patients than they
How Data Privacy Laws Impact Companies’ Approach to Cloud Security
It’s no secret that the beginnings of cloud computing were fairly humble. Executives within organizations were highly apprehensive about the idea of letting their most valuable asset, i.e., users’ data, be maintained on far-off sites
4 Food and Beverage Cybersecurity Challenges: How to Overcome Them
The June 2021 ransomware attack on JBS Foods that knocked out the plant operations supplying roughly a fifth of the United States’ meat supply and created shortages across the country proved not only that no
Benefits of Using Cloud Security Posture Management (CSPM)
Cloud computing has been revolutionizing the IT industry in the last couple of years. As a relatively new technology, cloud computing has changed the way both companies and individuals go about handling the required resources.
How to Prevent Cyber-Attacks on Water Filtration Systems
Over the past decade, cyber-attacks have been rampant on water facilities, especially in the United States. Some of these attacks are lethal, and they comprise a significant number of people. One of the most known
The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare
The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to
Cyber Whistleblowing: What Employers Should Know
As businesses adopt emerging technologies like AI and VR, professional lives are growing more connected to the internet and, therefore, the world. While this can drastically improve efficiency and contribute to business growth, it has
Best Identity and Access Management (IAM) Practices for DevSecOps
Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their