Cyber Security

Avoidable Mistakes Executives Continue to Make After a Data Breach (Harvard Business Review)

The past few years have taught us that companies will be breached and consumer data will be stolen. Last year was a record year for data breaches, and 2017, so far, has seen its fa... More

What is Vulnerability Management? Processes and Software for Prioritizing Threats (CSO)

Vulnerability management is the process of staying on top of vulnerabilities so the fixes can be more frequent and effective. Vulnerabilities in need of fixing must be prioritized ... More

Six Data Security Questions that Every Board Needs to Ask (HelpNetSecurity)

As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to provide ove... More

Every Security Behavior Has a Cost (SANS)

To effectively manage your organization's human risk, you need to change your workforces' behaviors. Behaviors such as how people use email, create passwords or share information. ... More

Cybersecurity: The Buck Stops in the Boardroom (Fortium)

Ever since the internet emerged as a public information gateway, thieves and pranksters have been working to exploit it for criminal gain. Today, cybercrime is a billion-dollar ind... More

Robert Half Exec Shares Strategies to Guard Against Cyberattacks (Global Recruiter)

Following the recently reported Uber data breach, Australian businesses have yet again received a reminder of the challenges cyber-threats present. With mandatory data breach notif... More

Cybersecurity Industry Missing a Crucial Component: Women (Information Age)

There are over one million cyber security roles currently unfilled today, according to data from job site Indeed. But, as was made clear in 2017, global cybercrime is increasing, w... More

Vulnerability and Patch Report, Nov. 26, 2017 (Citadel Information Group)

Important Security Updates Apple iOS: Apple has released version 11.1.2 of its iOS. Updates are available from Apple’s website. Avira Antivirus: Avira has released version ... More

WiTH Event to Run with Dec. 6 Content Protection Summit in L.A.

The Dec. 6 Content Protection Summit (CPS) being held at the Marina del Rey Marriott will also see the next Women in Technology: Hollywood (WiTH) workshop, this time with the theme... More

IBM Watson Can Predict the Latest Hacks (ET CIO)

Marc van Zadelhoff, General Manager, IBM Security has more than 20 years of experience in venture capital, cyber security and IT. In his current role, he has to face a new challeng... More

Kroll Names Amine Antari, Sameeh El-Din Managing Directors, Dubai Office (CDSA)

Kroll has announced the appointment of Amine Antari and Sameeh El-Din as Managing Directors in the firm's Dubai, United Arab Emirates office. Antari and El-Din bring decades of bro... More

Cisco, INTERPOL Collaborate to Combat Cybercrime (CDSA)

Cisco has announced an agreement to share threat intelligence as the first step in jointly fighting cybercrime. Headed by INTERPOL's global cybercrime center, the INTERPOL Glob... More

NSS Labs Selected as a 2017 Red Herring Top 100 Global Winner (CDSA)

NSS Labs  has been selected as a winner of the Red Herring Top 100 Global award. This annual award recognizes the most innovative private technology companies from Asia, Europe, a... More

Ransomware Always Tips Its Hand (ITSP Magazine)

With the large number of ransomware attacks that have surfaced in recent years, many people have mistakenly believed that it’s a new threat, and one that is impossible, or at lea... More

Smart Behaviors That Can Improve Your Cybersecurity (CNBC)

Some of the cybersecurity best practices for advisors are smart moves for consumers, too. "Don't make the mistake of thinking of [cybersecurity] as a technology thing. It's not,... More

How Military Veterans Transition To Civilian Cybersecurity (ITSP Magazine)

Given the number of ex-military folks we know who now work to defend networks, we understand that military veterans possess natural synergies that can allow them to develop into ou... More

Vulnerability and Patch Report, Nov. 19, 2017 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version Updates are available from Adobe’s website. Adobe Reader DC: Adobe has released versio... More

Companies Turn to War Games to Spot Scarce Cybersecurity Talent (Bloomberg)

A major shipping company is under attack. With help from a corrupt executive, an international hacking syndicate called Scorpius, has penetrated the computer networks of Fast Frei... More

Don’t Click That! How to Spot an Invoice Impersonation Attack (TechRepublic)

Workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that appears to come from a trusted party, according to a new threat spotlight report from ... More

From Oligarchs to New Yorkers, Kroll Vet Tommy Helsby Has a Risk Management View (The Straits Times)

Mention Russian oligarch and too frequently, the mental associations are with obscenely extravagant lifestyles, offshore accounts, trophy purchases of prestigious Western assets an... More