The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual organization, and therefore easier to defend, is gone. The concept of a defensible… Continue reading The perimeter is vanishing, how will you secure your network?

Attention CISOs: Five steps to get the security funding you need

Going in front of the board to request or increase your security funding is no easy task – especially when the organization is facing budget restraints or, worse, the board does not agree with your sense of urgency in securing the organization. I… Continue reading Attention CISOs: Five steps to get the security funding you need

What’s in a cybersecurity question? Getting to the root of cyber insights

The day to day practice of cybersecurity is based around asking questions. How do I secure my applications? How do I protect my data’s integrity? How do I manage storage and access? We all know the countless challenges of being on the front lines of cy… Continue reading What’s in a cybersecurity question? Getting to the root of cyber insights

Employee cybersecurity essentials part 2: Lost devices and unsafe connections

Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private lives is tricky. It can reinforce ITs added challenge of protecting company a… Continue reading Employee cybersecurity essentials part 2: Lost devices and unsafe connections

The surveillance economy has set its sights on smartphone sensors

The most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. The Internet of things (IoT) has given tech companies, advertisers, data broke… Continue reading The surveillance economy has set its sights on smartphone sensors

How password-less security benefits helpdesks

IT departments and helpdesk teams are desperately overworked and understaffed, and unfortunately, they continue to get inundated with even more tasks. Helpdesk teams are there for everything from huge system outages to simple password resets, and every… Continue reading How password-less security benefits helpdesks

Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

In 2019 we have reached a new turning point in the adoption of IoT – more markets and industries are migrating to a cloud-based infrastructure, and as the IoT continues to gain popularity and more devices and data move online, lawmakers and legislators… Continue reading Regulating the IoT: Impact and new considerations for cybersecurity and new government regulations

Hacking healthcare: A call for infosec researchers to probe biomedical devices

It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies that keep as alive and healthy will work as intended if malicious actors set… Continue reading Hacking healthcare: A call for infosec researchers to probe biomedical devices

What hackers inside your company are after: Convenience

Digital transformation is not a technology trend. Rather, it is a convenience trend. Businesses are changing because customer expectations demand it. Each day, consumers find yet another use for mobile connectivity. Corporations, meanwhile, hasten the … Continue reading What hackers inside your company are after: Convenience

Closed loop automation combats IoT security threats in the 5G age

The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and AT&T, are leading the 5G wars in a marketing-defined battle. Regardless of cur… Continue reading Closed loop automation combats IoT security threats in the 5G age