It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic shift, this push…
The post It’s I… Continue reading It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked inside that…
The post Hard-Coded Credentials: The Not-So-Se… Continue reading Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk

Different IoT Breach, Same (In)Security Story, Broader Consequences

“I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 when “Somebody’s Watching Me” topped the charts, but today it’s real life: somebody…
The post Different IoT Breach, Same (In)Security Story, Bro… Continue reading Different IoT Breach, Same (In)Security Story, Broader Consequences

Get Back to the Basics with Your Company’s Cybersecurity Practices

Basic hygiene best practices go beyond hand washing – even if you’re doing lots of that these days. The same hygiene concept extends into the digital world of cybersecurity. In an age of near-constant attacks,…
The post Get Back to the Basics with Yo… Continue reading Get Back to the Basics with Your Company’s Cybersecurity Practices

A Step in the Right Direction: The IoT Cybersecurity Improvement Act

A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital business transformation. Experts project that by…
The post A Step in … Continue reading A Step in the Right Direction: The IoT Cybersecurity Improvement Act

Banking Cybersecurity Vet: Why Transformation Must Start at the Top

The banking industry spends 40% more on combating cybercrime than any other industry, with a per-firm average of $18.5 million spent on direct costs of incidents annually. When you also consider that cyber attacks on…
The post Banking Cybersecurity V… Continue reading Banking Cybersecurity Vet: Why Transformation Must Start at the Top

People, Process and Technology: Six Best Practices for Cloud Least Privilege

If your company is like most, it rolled out flexible remote work options and dialed up digital transformation last year – all thanks to the cloud. And now, you probably rely on more cloud services…
The post People, Process and Technology: Six Best Pr… Continue reading People, Process and Technology: Six Best Practices for Cloud Least Privilege

Breach of Trust: How Cyber-Espionage Thrives On Human Nature

With so much of daily life tethered to digital communication and most of our important information residing in data clouds, we’ve all got a lot riding in this virtual atmosphere. So naturally, the seemingly endless…
The post Breach of Trust: How Cybe… Continue reading Breach of Trust: How Cyber-Espionage Thrives On Human Nature

Four Ways to Protect Against Supply Chain Infiltration

The far-reaching SolarWinds Orion attack has catapulted supply chain security vulnerabilities into the spotlight – particularly those involving the third-party software applications and hardware components that comprise much of today’s enterprise IT en… Continue reading Four Ways to Protect Against Supply Chain Infiltration

Cybersecurity Horror Stories That Make Us Scream with Fright

Editor’s Note: The digital world can be a scary place. Whether lurking in the shadows of the dark web or hiding in plain sight, cyber spooks are out to trick and terrify you, with no…
The post Cybersecurity Horror Stories That Make Us Scream with Fri… Continue reading Cybersecurity Horror Stories That Make Us Scream with Fright