All Posts Tagged Tag: ‘cyber security’

Gartner cybersecurity principles highlight need for risk-based security and the evolving role of the CISO

Gartner cybersecurity principles highlight need for risk-based security and the evolving role of the CISO

Earlier this month, the analyst firm, Gartner, held their annual Security and Risk Management Summit at the National Harbor, just …

Read More

Actually, There is a Simple Solution for Password Reuse

Actually, There is a Simple Solution for Password Reuse

Earlier this month in a blog on Kaspersky Lab’s Threat Post, well-known security writer, Tom Spring, shared his thoughts on …

Read More

The impact of ransomware on healthcare organizations – an interview with Mark Nunnikhoven of Trend Micro

The impact of ransomware on healthcare organizations – an interview with Mark Nunnikhoven of Trend Micro

Healthcare data is extremely sensitive, which also makes it extremely valuable to malicious actors. As we’ve discussed in previous posts, …

Read More

Census Bureau CISO, Tim Ruland, Discusses Cybersecurity Landscape for Federal Agencies

Census Bureau CISO, Tim Ruland, Discusses Cybersecurity Landscape for Federal Agencies

With government agencies more dependent than ever on information technology and networked operations to deliver on their mission, they are …

Read More

Walking out the door with sensitive data – a look at the FDIC breach

Walking out the door with sensitive data – a look at the FDIC breach

Federal agencies have a steep hill to climb when it comes to protecting their networks. They have a very diverse …

Read More

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Phishing is on the rise – how to ensure your company isn’t the catch of the day

Each quarter, the Anti-Phishing Working Group (APWG) – a coalition unifying the global response to cybercrime across industry, government, law-enforcement …

Read More

How a stolen laptop can cost healthcare companies $3.9M

How a stolen laptop can cost healthcare companies $3.9M

Here’s a scenario for you – an employee takes one of your company laptops from the office. They put it …

Read More

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

Analyzing the security catch 22s facing highly regulated, and oft targeted markets

In addition to mostly watching networks for breaches and responding accordingly when they were identified, traditional cyber security methodology and …

Read More

Point of Sales Systems Continue to Leave Restaurants – and Diners – Open to Data Breaches

Point of Sales Systems Continue to Leave Restaurants – and Diners – Open to Data Breaches

The hamburger you bought at Wendy’s  last month may be costing you a lot more than $4.99. The fast food …

Read More

PODCAST: Why security needs to extend across all links in your supply chain

PODCAST: Why security needs to extend across all links in your supply chain

If cybersecurity isn’t the top concern for an enterprise and its CIO in today’s heightened and increasingly sophisticated threat landscape, …

Read More

Page 1 of 712345»...Last »