Archive

Back to homepage
Identity Theft

Airbus Suffers Data Breach, Some Employees’ Data Exposed

European airplane maker Airbus admitted yesterday a data breach of its “Commercial Aircraft business” information systems that allowed intruders to gain access to some of its employees’ personal information. Though

Software

Healthcare Cybersecurity Preparedness Tops HHS Priority List

Recently, the U.S. Department of Health & Human Services (“HHS”) issued guidance for healthcare cybersecurity best practices.  As required under the Cybersecurity Act (CSA) of 2015, this four-part guidance was generated by a Task

Hardware/Network

5 New Year’s Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape

Software Uncategorized

The State Of Web Application Vulnerabilities In 2018

Web application vulnerabilities have been around for years and are often caused by application design flaws and misconfigured web servers. These vulnerabilities can be easy targets for hackers looking to

Industry Insights

How deception changes the rules of engagement in cyber security

Carolyn Crandall, Chief Deception Officer at Attivo Networks, explores how deception techniques can provide not only early detection of malicious activity but also an invaluable insight into an attacker’s methods.Deception

Software

Data security being left behind in digital transformation

Some companies looking to digitally transform are trying to run before walking, putting themselves and their customers at grave cybersecurity risks.Some companies looking to digitally transform are trying to run

Hardware/Network

Pepper IoT: Smart devices aren’t so bright when it comes to security

Smart devices aren’t very intelligent when it comes to protecting user privacy and handling security, according to a report by Internet of Things platform and service provider Pepper IoT and cybersecurity

Industry Insights

How CISOs Can Demonstrate Business Value

If you’re the typical CISO or other level of information security officer, chances are this job description sounds about right. “My role is to manage information security to keep the

Industry Insights

Five Cybersecurity Predictions For 2019

2018 was another year of change in the cybersecurity industry. I’ve had some interesting conversations with customers, partners, providers and analysts over the past twelve months, and I’m excited about

Cloud

Enterprises are struggling with cloud complexity and security

The rush to digital transformation is putting sensitive data at risk for organizations worldwide according to the 2019 Thales Data Threat Report – Global Edition with research and analysis from IDC. As