Tag "Cyber Security Guidelines"

Back to homepage

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Industry Insights

Hackers wage a new Cold War

The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the


Application Security: How to Secure the Many Apps in Your Enterprise

Today’s enterprises are struggling to secure their applications. With thousands of applications in use and new threats emerging daily, large organizations face a monumental task. Compounding matters is the fact


How Automation Helps Security Managers

It’s the nature of security operations: the worse the situation, the more you need everything to be working perfectly. Any issues with your program need to be figured out ahead

Industry Insights

What can we do to reverse the cybersecurity skills shortage?

An ever widening cybersecurity skills gap is making comprehensive cyber security protection – based on a combination of the latest tools and internal expertise – unaffordable for many organizations. “This issue isn’t

Industry Insights

How Can Security Professionals Know When to Trust and When to Hold Their Cards Close?

As the song’s lyrics express, there is a time for everything.  While there are times when holding your cards close and putting up high walls is necessary, there are certainly

Industry Insights

Do you know your gap?

Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following


How to Go From No Incident Response Program to SOAR

When interacting with companies that are considering purchasing a security orchestration, automation, and response (SOAR) solution, I often hear them express the concern that their current incident response program is

Industry Insights

32,000 smart homes and businesses at risk of leaking data

New research from Avast (LSE: AVST), the global leader in cybersecurity products, found more than 49,000 Message Queuing Telemetry Transport (MQTT) servers publicly visible on the internet due to a

Industry Insights

Many hands make light work – Combining resources to make a powerful
 Cybersecurity program

By Ronald McFarland – Associate Professor at University of Maryland University College, Many schools, including colleges, technical/trade schools, and universities are grappling with light cybersecurity enrollments while weighing the costs of