Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Artificial intelligence and machine learning are helping to fight crime - both digitally and in the real world. See how recent advancements...

How AI Advancements Are Affecting Security, Cybersecurity and Hacking


In the age of high-profile data breaches and GDPR, keeping customer data secure is more important than ever. Here we take a look at ways to...

Is Your Customer Data Really Safe? How It Can Be Exposed


They say that nothing in life is free – and that applies to VPNs as well. While you may not be paying for that 'free' VPN with money,...

Using a Free VPN? Not Really. You're Most Likely Using a Data Farm


The internet of things (IoT) is growing at a rapid pace, but that means our security measures must grow as well. See what steps you can...

10 Steps to Strengthen Your IoT Security


Bring your own device (BYOD) has become a standard in today's workplace. However, that doesn't mean that the security issues around it have...

Distributed Networks and the Challenge of Security


There is an inverse correlation with ROI for not investing adequately in cybersecurity or critical IT infrastructure. Today, due to the...

Why Skimping on IT Can Be Costly for Your Organization


Embedded analytics is helping businesses learn more about their customers - eliminating pain points and helping with predictive analytics....

3 Ways Embedded Analytics Can Help Build a Data-Driven Business


Could your organization be hacked? Why not hire a hacker to find out? Many are turning to ethical (white hat) hackers to test system...

How Your Organization Can Benefit From Ethical Hacking


The proper automation can tend to major incidents with little or no human input, responding more quickly than a human could, and helping...

5 Best Practices for Automating Major Incident Management


Cyberattacks such as data breaches involve more than just the internal IT department. The aftermaths can involve customers, partners and...

How Cyberattacks Affect Share Holders and Board Members


The exponential explosion in the value of bitcoin and other cryptocurrencies has garnered the attention of investors the world over. It has...

Hacking Activities Increase Along with Cryptocurrency Pricing


Despite growing up with unprecedented access to technology, millennials are falling victim to cybercrime more than any other generational...

Why Are Millennials Top Cybercrime Targets?


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


The internet, while an indispensable tool, is also the most likely access point for malware. Browser isolation allows internet use while...

The Top 6 Qualities to Look for in a Browser Isolation Solution


Everyone knows that a chain is only as strong as its weakest link, and the same goes for software - its security is only as strong as its...

Qualitative vs Quantitative: Time to Change How We Assess the Severity of Third-Party Vulnerabilities?


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...

Cybercrime 2018: The Enterprise Strikes Back


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...