Latest posts

Assessing Threats Against Critical Infrastructure: AEP’s Doug Washington Shares His Insight

Assessing Threats Against Critical Infrastructure: AEP’s Doug Washington Shares His Insight

In the last two months there’s been more than the usual amount of interest and commentary on the security and …

Read More

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Learning Lessons from Ukraine – Ensuring Cybersecurity for Critical Infrastructure

Earlier this year, we interviewed Ed Cabrera, the Vice President of Cybersecurity Strategy at global security software company, Trend Micro, …

Read More

Three Simple Actions to Protect Our Critical Infrastructure

Three Simple Actions to Protect Our Critical Infrastructure

For many years now in the information community and the media, there have been tales of apocalyptic power outages caused …

Read More

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Each quarter, the Anti-Phishing Working Group (APWG) – a coalition unifying the global response to cybercrime across industry, government, law-enforcement …

Read More

How a stolen laptop can cost healthcare companies $3.9M

How a stolen laptop can cost healthcare companies $3.9M

Here’s a scenario for you – an employee takes one of your company laptops from the office. They put it …

Read More

Recent attacks have healthcare executives and elected officials scrambling for answers

Recent attacks have healthcare executives and elected officials scrambling for answers

In recent posts on Access Granted, we’ve looked at the healthcare industry and the reasons why it’s so frequently targeted …

Read More

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

In addition to mostly watching networks for breaches and responding accordingly when they were identified, traditional cyber security methodology and …

Read More

Moving Beyond Multifactor Authentication to the Next Generation

Moving Beyond Multifactor Authentication to the Next Generation

Reading through the news headlines day after day, you could be forgiven for becoming immune to the stories about breaches, …

Read More

UCF breach shows that colleges and universities need to get serious about security

UCF breach shows that colleges and universities need to get serious about security

When we think about the organizations and enterprises that are prime targets for data thieves and malicious actors, the usual …

Read More

Healthcare Organizations in the Crosshairs of Malicious Actors

Healthcare Organizations in the Crosshairs of Malicious Actors

Over the last year healthcare organizations in the United States – both patient care facilities and insurance companies – have …

Read More

Page 2 of 14«12345»10...Last »