Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

Introduction  I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking for ways to maximiz… Continue reading Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

8 of the world’s biggest insider threat security incidents

Introduction If you work in security or are just interested in the general area of cybersecurity you will no doubt have heard of the dreaded insider threat. In the context of cybersecurity threats,…
Go on to the site to read the full article
The post… Continue reading 8 of the world’s biggest insider threat security incidents

NY SHIELD Act: Security awareness and training requirements for New York businesses

Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protection Regulation (GDPR) and the California…
Go on to the site to read the full article
The pos… Continue reading NY SHIELD Act: Security awareness and training requirements for New York businesses

SIM swapping security risks: What they are and how to protect yourself

Introduction The joke that someone needs to have a mobile phone “surgically removed” is not too far from the mark. Mobile phones have become ubiquitous and intrinsically linked to our digital…
Go on to the site to read the full article
The post SIM s… Continue reading SIM swapping security risks: What they are and how to protect yourself

Are apps stealing company secrets? Smart device privacy concerns for businesses

Introduction Privacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about…
Go on to the site to read the full article
The po… Continue reading Are apps stealing company secrets? Smart device privacy concerns for businesses

Coronavirus predictions: What are the long-term workplace implications of COVID-19?

Introduction: What will the world look like after the COVID-19 vaccine? Human societies are often challenged by events out of our control. Extreme weather events happen and take with them many…
Go on to the site to read the full article
The post Coro… Continue reading Coronavirus predictions: What are the long-term workplace implications of COVID-19?

Podcast recap: Identifying worms, bots, fraud and other malicious traffic (with guest Fang Yu)

Introduction Fang Yu is CTO of fraud detection platform DataVisor. She is also a prolific writer and conference presenter and has filed over 20 patents. Fang spoke with Infosec‘s Cyber Work podcast…
Go on to the site to read the full article
Th… Continue reading Podcast recap: Identifying worms, bots, fraud and other malicious traffic (with guest Fang Yu)