• Five Ways to Protect Against IoT Hackers – Avoid Potential Dangers

    Five Ways to Protect Against IoT Hackers – Avoid Potential Dangers

    One thing many of us forget is that every connected device hitting the market comes with a multitude of fresh vulnerabilities and attack points for hackers. This is not just worrisome — it’s downright scary, and no matter how excited you are for the future, there’s no denying the potential dangers new technologies introduce. It’s
    Read More…

  • 15 Startups Lighting up the Blockchain Cybersecurity Market

    15 Startups Lighting up the Blockchain Cybersecurity Market

    Blockchain technology is most often associated with cryptocurrencies and financial services applications.  But, it’s the very decentralized nature and cryptographic anchor of blockchain that makes it a prime foundation for cybersecurity solutions, particularly considering the continued mass-scale data breaches and identity theft happening on a worldwide scale and within the most well-guarded corporate perimeters.  The
    Read More…

  • CISOs on High Alert for Data Breaches in 2018

    CISOs on High Alert for Data Breaches in 2018

    Chief Information Security Officers are feeling less confident than ever about cyber-risk and data security this year, a new survey from Opus, the leading provider of global compliance and risk management solutions, and data and privacy research leader Ponemon Institute shows. As today’s climate of high-profile data breaches continues, 67% of respondents believe their companies
    Read More…

  • Free “Cybersecurity for Dummies” Resource Available from Thycotic

    Free “Cybersecurity for Dummies” Resource Available from Thycotic

    Thycotic, a provider of cybersecurity solutions for more than 7,500 organizations worldwide, today announced the release of its new book, “Cybersecurity for Dummies,” which is available free electronically, as well as in print. The new book gives every employee a practical understanding of cybersecurity basics – describing common threats people face in their daily, personal
    Read More…

  • War On Cyberattacks and Digitalisation are High Business Priorities

    War On Cyberattacks and Digitalisation are High Business Priorities

    Changing business priorities will see a greater emphasis on cybersecurity and digitalisation over the next three years, according to almost 1000 senior executives in a survey by Financial Times | IE Business School Corporate Learning Alliance . The findings come from this year’s Corporate Learning Pulse, a major leadership study conducted among C-Suite executives, HR
    Read More…

  • Healthcare Entities Account for over 25% of Reported Data Breaches

    Healthcare Entities Account for over 25% of Reported Data Breaches

    Despite advances in security technology and increased governmental cybersecurity initiatives, attackers will not abandon their pursuit of unprotected patient data. According to the Identity Theft Resource Center, this past year healthcare entities accounted for 27.4% of reported data breaches. It’s clear that the healthcare industry is less prepared with HIPAA compliance than patients expect. HIPAA
    Read More…

  • 10 Cybersecurity Threats and Trends for 2018

    10 Cybersecurity Threats and Trends for 2018

    “As organizations and individuals become increasingly reliant on IoT for critical functions, the risks that we are taking are becoming greater and greater,” says Christopher Skinner, CEO of technology security firm SpiderOak. “Attack surfaces are exploding – the nearly 4 billion people online worldwide means 4 billion different entry points for criminals. We trust our
    Read More…

  • Customer-Facing Applications pose Security Risk

    Customer-Facing Applications pose Security Risk

    Customer-facing web and mobile applications present the highest security risk to businesses in Asia Pacific according to the results of a survey published by  Synopsys, Inc. In addition, 48 percent of those surveyed highlighted the lack of skilled security personnel or training as one of the biggest challenges to implementing a software security program. Read the
    Read More…