What 2017 has in store for cybersecurity
There is much uncertainty surrounding the security industry for 2017, and according to experts in the field, a lot of the trepidation is directly connected to what the nation’s next president will do....
View ArticleHow white hat hackers do bad things for good reasons
Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You set...
View ArticleThe unseemly world of darkweb marketplaces
The genesis of underground markets goes back to when communication used to take place via Internet Relay Chat channels. Fast forward to the 21st Century with the evolution of cryptocurrencies and...
View ArticleWould killing bitcoin end ransomware?
Ransomware is running rampant. The SonicWall GRID Threat Network detected an increase from 3.8 million ransomware attacks in 2015 to 638 million in 2016. According to a Radware report, 49 percent of...
View ArticleDisaster recovery: How is your business set up to survive an outage?
Asynchronous vs synchronous. Dark disaster recovery vs. active architecture. Active/active vs. active/passive. No setup is objectively better or worse than another. The best one for you primarily...
View ArticleDo you have an incident response plan in place?
Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.To...
View ArticleCybersecurity startups to watch
In canvassing the security industry, CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They...
View ArticleData breaches through wearables put target squarely on IoT in 2017
Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — enough said.With the sheer velocity of how the...
View ArticleWhere to cut corners when the security budget gets tight
Whenever creating a budget, there is always the rainy day fund or the contingency account in case of unexpected circumstances. But what if those circumstances are a data breach that is bigger than you...
View Article