Tag "Information Security"

Back to homepage
IT Compliance

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now

Expert Articles

How Vulnerable is Your Data Really?

By Nick Galov – Web Hosting Expert, Content Manager at Techjury.net, By now, most of us are internet savvy enough to realize that we shouldn’t be downloading files off the

Software

How Blockchain Can Fight Fraud Based on Know-Your-Customer Data

As the cost of retail fraud grows year-over-year, merchants are constantly looking for ways to tackle security challenges and reduce their liability burden. Blockchain technology, with the ability to create secure

Software

Dating App Says Stolen Data Was Sold on Dark Web

In the aftermath of multiple reports that millions of stolen records were dumped on the dark web, the dating app Coffee Meets Bagel confirmed that the accounts of approximately six million users

Software

Most wanted malware in January 2019: A new threat speaks up

Check Point’s Global Threat Index for January 2019 reveals a new backdoor Trojan affecting Linux servers, which is distributing the XMRig crypto-miner. The new malware, dubbed SpeakUp, is capable of

Software

Phishing, Humans Root of Most Healthcare Attacks

Across healthcare organizations in the US, malicious actors are successfully leveraging phishing attacks to initially gain access to networks, according to findings from the 2019 HIMSS Cybersecurity Survey published by the Healthcare Information

Software

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here’s what you need to know about this venerable, but increasingly sophisticated, form of cyber

Cloud

Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption

65 percent of infosecurity professionals would like to store object data in the cloud, but 47 percent either don’t believe or are not sure if data in the cloud is

Software

The Benefits of Correctly Deploying a PKI Solution

With new threats to data emerging every day, public key infrastructure (PKI) has become an increasingly larger part of enterprises’ information security and risk management strategies. Research has found that 43% of

Software

Execs Remain Weak Link in Cybersecurity Chain

Despite their high-ranking positions, senior executives are reportedly the weak link in the corporate cybersecurity chain with a new report from The Bunker, which finds that cyber-criminals often target this known