Insider Threats: A Big Fear for Small Businesses

In the list of things that keep SMB leaders awake at night, insider threats rate at the top. Here’s why this threat is far bigger for smaller companies. A recent report finds that more than half (58 percent) of small-to-medium-sized business (SMB) exe… Continue reading Insider Threats: A Big Fear for Small Businesses

Insider Threats: A Big Fear for Small Businesses

In the list of things that keep SMB leaders awake at night, insider threats rate at the top. Here’s why this threat is far bigger for smaller companies. A recent report finds that more than half (58 percent) of small-to-medium-sized business (SMB) exe… Continue reading Insider Threats: A Big Fear for Small Businesses

2019’s Hottest, and Most Bankable, Security Certs

Most certifications can help your career, but a select few will land you a great job or add money to your paycheck. Here are the most bankable certifications this year, as well as a glimpse of next year’s most wanted list, according to those in the fi… Continue reading 2019’s Hottest, and Most Bankable, Security Certs

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last one is rare… Continue reading Lack of User Privacy Threatens Security Defenses

State of Eavesdropping on Mobile Devices

Eavesdropping is a prevailing threat among many on mobile phones, with technology capable of tracking users, listening to their conversations and even logging their application usage becoming more pervasive and easier to come by. “Mobile devices conta… Continue reading State of Eavesdropping on Mobile Devices

Phishers’ Favorite Brands to Spoof

Phishers are always looking for a better brand to spoof and improve their success rates. They’re quick to switch out brands to keep their bait fresh, too. Keeping the tally of their favorites in a given period may afford insights into attack trends, b… Continue reading Phishers’ Favorite Brands to Spoof

Banks Highly Vulnerable to Inside Attacks

Banks are more serious about information security than most companies in other industries, but they’re still regularly robbed to the tune of millions and even billions of dollars. In 2016, $81 million was siphoned from the Bank of Bangladesh—just one … Continue reading Banks Highly Vulnerable to Inside Attacks

Modernized Industrial Systems Still at Pre-Internet Vulnerability Levels

Industrial Control Systems (ICS) were developed decades ago when any thoughts of security centered on locking down the physical plant. That’s because they were designed, developed and deployed before the internet took root, much less blossomed into th… Continue reading Modernized Industrial Systems Still at Pre-Internet Vulnerability Levels

How GDPR Affects IAM Usage

GDPR is placing a lot of demands on companies to protect the privacy of individuals. But what does that mean for identity management? The European Union’s General Data Protection Regulation (GDPR) takes effect May 25 and aims to protect the identity o… Continue reading How GDPR Affects IAM Usage

Tips for Using IAM in a Gig Economy

IAM can be challenging for security teams and downright vexing for freelance and short-term contract workers. These tips will help smooth the IAM path for all. Even in the strong U.S. economy—or perhaps because of it—layoffs of permanent personnel are… Continue reading Tips for Using IAM in a Gig Economy