Tag "Cyber Security Guidelines"

Back to homepage
Network Security

Access to Thousands of Breached Sites Found on Underground Market

By Vitali Kremez, Director of Reasearch at  Flashpoint, Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of

Software

Cyberwarfare: the danger and potential answers

Following comments by, Nick Carter, Chief of the Defence Staff, the most senior uniformed military adviser to the Secretary of State for Defence and the Prime Minister, Information Age quizzed

Industry Insights

What is a Security Token? A Comprehensive Guide to How They Work and Their Impact

There’s been a lot of talk about security tokens recently. But what is a security token in the first place? How do they work? And how might they impact your

Software

Easy Steps for Recovery from a Hacked Website

By Julia Sowells Senior Information Security Specialist at Hacker Combat, A website getting hacked is no news today; it has become an almost common thing. So, what to do if your

Industry Insights

Why a Dog Bite is a Lesson in Handling Cyberattacks

A few weekends ago, my dog bit me. In his defense, it was dark and I had tackled him unexpectedly to stop him from walking off our under-construction, railing-less deck.

Industry Insights

Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital

Industry Insights

The Seven Leading Security Gaps in Industrial Environments

October is officially National Cyber Security Awareness month, and this year one of the program’s key messages is working together to secure critical infrastructure from cyber threats.  Clearly, security weaknesses

Industry Insights

Election Security Is Risky at State and Local Levels

As the 2018 midterm elections near, many remain concerned about the security of election infrastructure at the national level, though Steve Grobman, CTO at McAfee, said the realistic security risk lies

IT Compliance

GDPR Fear is Stifling Employees, Here’s How to Fix It

More than three months after GDPR came into effect, businesses have found themselves between a rock and a hard place – taking every step possible to correct protocols, policies and

Industry Insights

The 3 Components of Every Good Cybersecurity Plan

No matter your business’s size, you are a target for someone. Cybercriminals are now more numerous than ever, and they have a threat surface larger than any we’ve ever seen