Back to homepage
Industry Insights

New cybersecurity threats unwrapped: Hidden Cobra, public safety apps, Western Digital My Cloud

The North Korean government’s malicious activity also made it into this month’s cybersecurity report from HIMSS.December saw another round of cyber threats emerge that highlight healthcare’s need to better communicate.


ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned?

Automatic Dependent Surveillance Broadcast (ADS-B) is a technology mandated in all commercial and general aviation aircraft by 2020. It gives the pilot a kind of weather radar and assists with


Take a Dive: Deep Network Insights for Deeper Analytics

Security analytics are only as good as the data that feeds them. I’m not saying that advanced analytics such as machine learning and artificial intelligence (AI) aren’t amazingly powerful and


The Case of Disappearing Vulnerabilities

The growth of Software-as-a-Service (SaaS) has fundamentally changed the security model. As applications shift from on-premise to the cloud, the burden of securing them also shifts: from customer to developer.

Identity Theft

8 security breaches that got someone fired

Some deserved the blame, and some seemed to just be at the wrong place at the wrong time.  Click here to view original webpage at

IT Compliance

How to protect personally identifiable information (PII) under GDPR

The EU’s General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here’s what you need to know.The European Union’s (EU’s) General Data Protection Regulation (GDPR)

Industry Insights

The Disconnect Between Cybersecurity & the C-Suite

Most corporate boards are not taking tangible actions to shape their companies’ security strategies or investment plans, a PwC study shows. Despite all the attention that massive hacks and other

Industry Insights

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.Cyber security is the practice

IT Compliance

How to turn GDPR into an opportunity for your business

Businesses in the technology sector can use the General Data Protection Regulation as a positive opportunity for digital transformation Compliance with GDPR will no doubt require a fair amount of

Identity Theft

In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach

There have been countless cyberbreaches over the past few years in which personal data, such as user IDs and passwords, have been compromised. These range from attacks against government agencies,