Is There Hope for ICS and Supply Chain Security?

Industrial control systems (ICS) have been the target of countless cyberattacks in recent years. Some of these attacks have an extortion goal in mind, while others seem to be nothing more than a test to see if the attacker is able to access and disrup… Continue reading Is There Hope for ICS and Supply Chain Security?

How Remote Work Changes Where we Work and Live

Many crises have caused societies to explore new opportunities, and the pandemic-induced switch to remote work is certainly an example. It is likely to accelerate underlying trends in urban living and enhance the quality of life for city dwellers. Eve… Continue reading How Remote Work Changes Where we Work and Live

The Role of Ethics in Cybersecurity Studies

Nobody wants to be a proverbial guinea pig; least of all, developers donating their time and energy to making the world a better place. You’d think with all the recent discussion about consent, researchers would more carefully observe ethical bo… Continue reading The Role of Ethics in Cybersecurity Studies

WAFaaS: When ‘As-A-Service’ Means ‘Bad Service’

In 1908, Henry Ford introduced the Model T – the world’s first mass-produced vehicle. In his quest to quickly mobilize Americans, Ford famously quipped that the car was available to his customers “in any color they’d like so long as it’s black,” The l… Continue reading WAFaaS: When ‘As-A-Service’ Means ‘Bad Service’

Why You Should Start Caring About Oversharing

Today’s website owners are focused on building a great online experience for their users. Digital transformation is all about shifting how we do business and offer services – and today’s rich web experience is part of that revolution. But all th… Continue reading Why You Should Start Caring About Oversharing

How to Protect Structured and Unstructured Data

Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data

Lessons in Securing Development Environments

The new world of software development is inherently collaborative — development teams are geographically dispersed and require easily accessible and automated tools to ship products and features quicker with confidence. The new generation of developme… Continue reading Lessons in Securing Development Environments

The Perils of a Running Start: Can You Skip SOC 2 Type 1?

We’re often asked by customers embarking on the SOC 2 journey, “Can we skip the SOC 2 Type 1 and go straight into a Type 2?” They reason that instead of paying for two audits, they would only pay for one. It seems like an easy choice, righ… Continue reading The Perils of a Running Start: Can You Skip SOC 2 Type 1?

Passwords a Threat to Public Infrastructure

With this year’s World Password Day upon us, it’s high time to take a good look at the critical infrastructure sector and the password-related security vulnerabilities that are in dire need of an update. While modern utility systems become increasingl… Continue reading Passwords a Threat to Public Infrastructure

Breach Clarity Weekly Data Breach Report: Week of May 3

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of May 3