Tag "Cyber Security Strategy"

Back to homepage
Software

Why hackers reuse malware

Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is that most new

Software

Pen Testing & Scanning for Vulnerabilities: Differences & Methodologies

The rate of hacking attacks is rising every year, and at the same time the actual number of individual businesses being attacked is going up. The question of how to

Industry Insights

It’s Time to Add a Third Pillar to Your Security Strategy…Intelligence

The recent global ransomware attacks that have dominated television news and headlines across the UK and Europe should be a call to arms for organisations around the world. Hundreds of

Industry Insights

Risk assessment: The first step in improving cyber security

Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no longer feasible to

Industry Insights

Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has been predicted that

Industry Insights

1 in 5 IT security pros still use paper to track accounts and passwords

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that 88 percent

Industry Insights

Three Security Predictions

DevOps is an increasingly popular development practice allowing organisations to increase the speed at which they produce apps and services. An unfortunate side effect of this process is that you

Industry Insights

Modernizing cybersecurity training for the next generation

Equifax, Verizon, Molina Healthcare, Deloitte, Whole Foods, Wendy’s… it seems like every time we turn on the television another high-profile data breach is being reported. Despite an unprecedented number of security tools

Identity Theft

Security Breaches

Be your own advocate! As a patient, it is important to do your own research, ask questions about the recommended course of medical action and then work in conjunction with

Industry Insights

Cybersecurity is not just an IT issue, but also a strategic investment

The digital transformation journey is leading companies to embrace the cloud, the internet of things (IoT), big data and other digital initiatives. Click Here To View Original Webpage At www.itproportal.co