Cybersecurity company benefits should reduce stress but don’t

From start-ups to Silicon Valley giants, tech company employees work in some of the most luxurious offices in the world, especially as the best of businesses battle to attract top talent. For those of us in high-anxiety fields, some attempts have been … Continue reading Cybersecurity company benefits should reduce stress but don’t

There’s no way to fill the data skills gap, what now?

A recent survey of 100 UK CIOs found that 76% are worried about recruiting the IT staff they need to remain competitive. They’re right to be worried. The European Commission estimates that 100,000 new data-related jobs will be created by the end of nex… Continue reading There’s no way to fill the data skills gap, what now?

The overlooked part of an infosec strategy: Cyber insurance underwriting

When a data breach or cyber attack hits the headlines one of the last things businesses are likely to consider is how cyber insurance could helped. Outside of a general awareness that cyber insurance is an easy to purchase , some companies struggle to … Continue reading The overlooked part of an infosec strategy: Cyber insurance underwriting

Preventing insider threats, data loss and damage through zero trust

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, eventually all organizations will be forced to come to terms with these reali… Continue reading Preventing insider threats, data loss and damage through zero trust

Women in cybersecurity can benefit from taking inventory of their personal apps

Today, technology fits into the palm of our hand. We have become accustomed to turning to it to find all sorts of answers to everyday challenges such as where to eat, where to shop, what to watch on our favorite streaming service, or even when to sleep… Continue reading Women in cybersecurity can benefit from taking inventory of their personal apps

California IoT security law: What it means and why it matters

In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months on January 1, 2020. While the goal of the law is to better address the risks … Continue reading California IoT security law: What it means and why it matters

Want to build a successful SOC? Here’s what you need to know

There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger security posture and more robust data protection strategy is a 24×7 facili… Continue reading Want to build a successful SOC? Here’s what you need to know

Redefining security KPIs for 5G service providers

Telco security professionals are missing the mark when understanding their consumers’ priorities, according to KPMG’s recent report. In the wake of a security breach, consumers seek proof that the incident isn’t repeatable, while security executives pr… Continue reading Redefining security KPIs for 5G service providers

Hackers helping communities: Leveraging OSINT to find missing persons

People, in general, like helping other people, no matter their degree of connection. And then there are people who go even further: they find a way to help people help people. Robert Sell, the founder and president of Trace Labs, is one of those indivi… Continue reading Hackers helping communities: Leveraging OSINT to find missing persons

Attack tools and techniques used by major ransomware families

Ransomware tries to slip unnoticed past security controls by abusing trusted and legitimate processes, and then harnesses internal systems to encrypt the maximum number of files and disable backup and recovery processes before an IT security team catch… Continue reading Attack tools and techniques used by major ransomware families