Posts tagged with cybersecurity

Cybersecurity Strategy · Data Security

Addressing Cryptocurrency Trading Security Issues

Cryptocurrency trading has been gathering pace over the past few years and has been compared to the American Wild West. Early adventurers have faced tremendous risks in terms of extreme market...

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

Eyeball spy
Encryption · Privacy · VPN

Does more surveillance offer more protection?

The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

money-256314_1920
Cybersecurity Strategy · Data Security · Encryption · VPN

Trouble in store? Don’t forget VPN

For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

Cybersecurity Strategy · VPN

Back to Basics: Tackling the Fundamental Cybersecurity Solutions [VIDEO]

It’s fair to say that organizations, particularly larger enterprises, are making more concerted efforts nowadays to invest heavily and quickly into cybersecurity. Just a few short years ago,...

Padlock Icon Computer Key Showing Safety Security And Protected
Certificates · Industry Commentary

Does Bringing an ’Ethical Hacker’ In House Pay Off?

A study last year estimated that the global losses from cybercrime ranged from $375 to $575 billion – for just 2014 alone. This figure is only expected to get higher with each passing year as...

Young woman with laptop
IT policy

Cybersecurity Isn’t Generational: Why Millennials May Not Be the Tech Hope of the Future

Of all the assumptions made and beliefs held about millennials, one of the most common is that they’re uniquely tech-savvy. After all, this is the first generation to grow up being exposed first to...

Security Defense
Rethink Remote Access · VPN

Smaller Scale Is No Defense: Why SMBs Should Assume They’re Already Targets of Cyberattackers

You would be hard pressed to go a month without hearing about a new data breach or major cyberattack in the headlines. These incidents occur with such regularity nowadays that seemingly every industry...

Guitar
Expert Q&A · Industry Commentary · IT policy · Posts

How One Challenging Gig with My Band Prepared Me for a Career in Cybersecurity

Sometimes, connections between work and play appear when they're least expected. You wouldn't expect, for example, a guitar-shredding metal-head to carry over much from his time on stage to his career...