Kicking Off RSA: Thales eSecurity Celebrates Its Partners and Customers

The 2018 RSA Conference officially kicked off with a welcome reception on Monday evening. Following a couple hours spent milling…
The post Kicking Off RSA: Thales eSecurity Celebrates Its Partners and Customers appeared first on Data Security Blog &… Continue reading Kicking Off RSA: Thales eSecurity Celebrates Its Partners and Customers

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it&#8… Continue reading Symantec Internet Security Threat Report 2018: The Top Takeaways

20 Critical Security Controls: Control 7 – Email and Web Browser Protections

Today, I will be going over Control 7 from version 7 of the CIS top 20 Critical Security Controls – Email and Web Browser Protections. I will go through the 10 requirements and offer my thoughts on what I’ve found. Key Takeaways for Control… Continue reading 20 Critical Security Controls: Control 7 – Email and Web Browser Protections

Over 3,000 free Android apps violate kids’ US privacy law

It’s already tough for users to understand app permission requests to access various features on their phones. Kids who download game or language apps face an even tougher time understanding what they are giving up in exchange. Because we rarely … Continue reading Over 3,000 free Android apps violate kids’ US privacy law

Machine Learning is Also a Tool for Cybercriminals

It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I kno… Continue reading Machine Learning is Also a Tool for Cybercriminals