How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

Why Phishing Works: It Exploits Human Gullibility (Avanade Insights)

Phishing has evolved from a scatter-gun approach as a generic email sent to millions of people with the expectation of a low percentage of hits to a targeted campaign designed to e... More

Can We Trust AI-Enabled Machines With Our Cybersecurity? (DXC Technology)

Unless you are coming straight from the dark ages, you cannot escape the deluge of news about the advancement of AI in all spheres of life, be it autonomous vehicles, healthcare or... More

GDPR Six Months On: Is It Working? (Verdict)

Yesterday marked six months since Europe’s General Data Protection Regulation came into force. Since the 25 May, there have been a number of high-profile data breaches that have ... More

Can Advancements in Data Science Address the Challenges to Cybersecurity? (SDC)

The growing complexity in IT networks along with the emergence of technological marvels like IoT, the global connectivity is headed to its peak. The evolution of smart algorithms, ... More

Top 5 Ways to Pick a Secure Password (TechRepublic)

Oh, passwords. Someday somebody will save us from them. Until that heady day, we still need them and we need to choose ones that are really hard to guess. Even if you have two-fact... More

As Mobile Security Challenges Mount, How Can CIOs and CISOs Eliminate Blind Spots? (Security Intelligence)

If we’ve learned anything this year, it’s that mobile malware, malvertising and phishing attacks are growing. Organizations of all sizes and industries are at risk, and IT and ... More

Most Businesses to Add More Cloud Security Tools (Dark Reading)

Three quarters of organizations plan to buy more cloud security tools in 2019 as a means to better secure increasingly complex cloud environments, new research shows.Nearly 350 sec... More

What CIOs Can Learn From Cybercrime Syndicates (Raconteur)

By translating the psychology, motivations and modus operandi of these threat actors into insightful and informed decisions, the CIO can be better prepared to mitigate cyber-risks ... More

Wi-Fi in Public Places: Think Twice and Use Encryption (DXC Technology Blog)

Do you stop to think before joining a wireless network or is the convenience of free Wi-Fi in the street, at the café or on the bus just too tempting? You may not realize it, but ... More

Will Artificial Intelligence Save Us From the Next Cyberattack? (OZY)

As online hackers increasingly use advanced technology for penetrative attacks, the companies that host our private information also are engaging the most advanced systems availabl... More

Big Data is Causing a Surge of Data Breaches – Here are Some Solutions (SDC)

Data breaches can happen at multiple levels. Among a recent surge of data breaches, the ones with the greatest publicity are usually those affecting prominent websites or online se... More

NSS Labs to Develop its 2019 SD-WAN Group Test (CDSA)

NSS Labs announced that it is developing the next iteration of its Software-Defined Wide Area Network (SD-WAN) Group Test. As part of today’s announcement, NSS Labs is also issui... More

Cloud Misconfiguration: The Security Threat Too Often Overlooked (InfoWorld)

A survey of 300 IT professionals reveals that most enterprises are vulnerable to security events caused by cloud misconfiguration, including data breaches and system downtime event... More

Breaking Through the Privacy Illusion with Blockchain (Digitally Cognizant Blog)

What is modern-day privacy? With the extent of information sharing and connectivity prevalent today, the definition of what needs to be protected, at what level and from whom, seem... More

The Increasing Threats to Mobile Device Security and How to Thwart Them (DXC Technology Blog)

When it comes to securing mobile workers, Cybersecurity Awareness Month is the perfect time to step back from the daily grind, identify where the next wave of threats might be comi... More

A Solution to Unreadable Online User Agreements (WSJ)

Accept. Agree. Submit. I’ve lost count of how many times I’ve clicked on buttons like these, agreeing to online terms of service that I haven’t actually reviewed. I’m hardl... More

Why Blockchain is No Silver Bullet for Cyber Threats (Forbes)

Tomorrow’s quantum computers will be more far powerful than today’s digital classical computers. Quantum technology will be poised to decrypt the complex algorithms that asymme... More

5G is Coming – Don’t Panic! Pay TV Faces Threats, but Also Opportunities (Irdeto Perspective)

It’s been a long time coming, but 5G is finally on the horizon. It promises ultra-fast broadband via a mobile connection, eliminating the need for wired infrastructure. Mobile op... More

6 Security Training Hacks to Increase Cyber IQ Org-Wide (Dark Reading)

Some of security's toughest nuts to crack are the vulnerabilities introduced by the human element. Users are duped by phishers every day. IT operations staff configure infrastructu... More