Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Embedded analytics is helping businesses learn more about their customers - eliminating pain points and helping with predictive analytics....

3 Ways Embedded Analytics Can Help Build a Data-Driven Business


Bring your own device (BYOD) has become a standard in today's workplace. However, that doesn't mean that the security issues around it have...

Distributed Networks and the Challenge of Security


There is an inverse correlation with ROI for not investing adequately in cybersecurity or critical IT infrastructure. Today, due to the...

Why Skimping on IT Can Be Costly for Your Organization


Could your organization be hacked? Why not hire a hacker to find out? Many are turning to ethical (white hat) hackers to test system...

How Your Organization Can Benefit From Ethical Hacking


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


The internet, while an indispensable tool, is also the most likely access point for malware. Browser isolation allows internet use while...

The Top 6 Qualities to Look for in a Browser Isolation Solution


Everyone knows that a chain is only as strong as its weakest link, and the same goes for software - its security is only as strong as its...

Qualitative vs Quantitative: Time to Change How We Assess the Severity of Third-Party Vulnerabilities?


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...

Hacking Activities Increase Along with Cryptocurrency Pricing


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Despite growing up with unprecedented access to technology, millennials are falling victim to cybercrime more than any other generational...

Why Are Millennials Top Cybercrime Targets?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...

Cybercrime 2018: The Enterprise Strikes Back


AI and IoT are bringing exciting new advancements, not just for ordinary folks, but for hackers as well. As malicious entities try to...

Cybersecurity: How New Advances Bring New Threats - And Vice Versa


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at...

The Control Panel: Why the Best Vendor Cybersecurity Dashboards Are Complex


Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern...

Making Networks More Secure in the Age of Cybersecurity


We all want to protect our private information when browsing online, but how possible is it, really? Here we take a look at different types...

Internet Browsing and Security - Is Online Privacy Just a Myth?


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no...

Simply Secure: Changing Password Requirements Easier on Users


Businesses are increasingly turning to public cloud options, but is that the right choice for your data? Learn about 6 of the biggest risks...