Exploring the benefits of cybersecurity certification

In this interview, Tony Vizza, Director of Cybersecurity Advocacy APAC, (ISC)2, talks about the benefits of earning a cybersecurity certification, the most common misconceptions related to getting certified, the cybersecurity skills shortage, and much … Continue reading Exploring the benefits of cybersecurity certification

DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable to compliance and security issues. In this case, federal prosecutors charged a… Continue reading DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Phishing attacks are a complex problem that requires layered solutions

Most cyber attacks start with a social engineering attempt and, most often that not, it takes the form of a phishing email. It’s easy to understand the popularity of this attack vector: phishing campaigns are relatively inexpensive (money- and ti… Continue reading Phishing attacks are a complex problem that requires layered solutions

How to remove human error from the cyber risk equation

In attempting to fortify the enterprise’s cyber assets, we have turned much of our attention to human error. After all, the vast majority of hackers rely upon their exploitation of employees to break through corporate defenses, anticipating that these … Continue reading How to remove human error from the cyber risk equation

Why organizations must arm their SOCs for the future

Security Operations Centers (SOCs) around the globe represent the first line of defense between enterprises and cyber-threats. This mission requires that SOCs respond to security alerts around the clock, and jump into action as quickly as possible to m… Continue reading Why organizations must arm their SOCs for the future

How cybersecurity accelerates business growth

It’s no secret that the cybersecurity industry has grown exponentially over more than a decade due to the proliferation of high-profile cybercrime. Viewing cybersecurity as simply a necessary step to mitigate cyber risk leaves much opportunity on the t… Continue reading How cybersecurity accelerates business growth

Deepfakes and voice as the next data breach

Deepfake technology, which uses deep learning to create fake or altered video and audio content, continues to pose a major threat to businesses, consumers, and society as a whole. In the lead up to the 2020 U.S. presidential election, government offici… Continue reading Deepfakes and voice as the next data breach

Code dependency mapping’s role in securing enterprise software

Enterprise software is only as good as its security. Today, a data breach costs $3.92 million on average. Organizations are expected to spend $124 billion on security in 2019 and will probably invest even more given the alarming rate at which cyberatta… Continue reading Code dependency mapping’s role in securing enterprise software

Microsegmentation for refining safety systems

When the TRITON (aka TRISIS) attack struck three refining sites in the Middle East in November of 2017, it was the first known cyber incident to target safety instrumented systems (SIS), specifically Schneider Electric’s Triconex gear. The consequences… Continue reading Microsegmentation for refining safety systems

“Smart city” governments should also be smart about security

While the definition of “smart city” is still under debate, one thing is indisputable: the technologies used to make smart cities a reality are currently acquired and deployed after very little (or even no) security testing. Cesar Cerrudo, … Continue reading “Smart city” governments should also be smart about security