cybersecurity

It’s all in your hands: Devising a winning cybersecurity strategy

Developing a robust cybersecurity strategy is one of your most effective tools for preventing an attack. But how do you…

6 months ago

Oh the humanity! Why people are your biggest cybersecurity risk factor

You can ramp up your security technology all you want, but you still have to watch out for the biggest…

6 months ago

15 cybersecurity terms even your non-techie employees must know

Do you have non-techie employees? If they understand these key cybersecurity terms, they will be able to make the right…

6 months ago

Urgent message to SMBs: Plug these cloud security gaps now

Think you won’t be hit by hackers because you’re an SMB? Think again. And that’s why you must close these…

6 months ago

Breach and attack simulation: Risks and rewards of BAS solutions

Having a cybersecurity expert simulate an attack on your network with a BAS product can reap big benefits — if…

7 months ago

Cities increasingly in the crosshairs of ransomware attacks

Major cities are increasingly the targets of hackers who believe governments are easy prey for ransomware attacks. There are ways,…

1 year ago

Cyber kill chain: How understanding what it is can help you stop cyberattacks

If you don’t know how a cyberattack happens, you may be defenseless to stop it. A cyber kill chain can…

2 years ago

7 lessons from the Equifax breach: Insights from a former US cybersecurity czar

What do we learn from the Equifax breach? Quite a lot, according to experts who attended the annual conference of…

2 years ago

Dark cloud: Will worries over data privacy shape cloud computing in the age of Trump?

Cloud computing in the age of Trump is off to a bumpy start, as some worry about the new president’s…

2 years ago

Big, bigger, biggest: Top big data trends for 2017

With big data, the world is witnessing a major shift in computing and processing. Here are some of the top…

3 years ago