GUEST ESSAY: ‘Cybersecurity specialist’ tops list of work-from-home IT jobs that need filling

Even before the COVID-19 pandemic turned many office workers into work-from-home (WFH) experts, the trend toward working without having to commute was clear.
Related: Mock attacks help SMBs harden defenses
As internet bandwidth has become more availabl… Continue reading GUEST ESSAY: ‘Cybersecurity specialist’ tops list of work-from-home IT jobs that need filling

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malwa… Continue reading GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come.
Related: Web apps are … (more…)
The post GUEST ESSAY:… Continue reading GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

One legacy of the ongoing global pandemic is that companies now realize that a secured and well-supported remote workforce is possible. Recently, the University of Illinois and the Harvard Business School conducted a study, and 16% of companies reporte… Continue reading GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks.
Related: Welcome to the CyberXchange Marketplace
In the U.S. alone, in fact, there are more than 5,000 … (more… Continue reading GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve… Continue reading GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyb… Continue reading GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

Cyberattacks are becoming more prevalent, and their effects are becoming more disastrous. To help mitigate the risk of financial losses, more companies are turning to cyber insurance. Related: Bots attack business logic Cyber insurance, like other form… Continue reading GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection from natural disasters, theft, va… Continue reading GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other notable security experts. Although, t… Continue reading GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures