Author Archives: Sanofiya Shelat

What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack. An advanced persistent threat (APT) is a cyberattack executed

The post What is an advanced persistent threat (APT)? And 5 signs you’ve been hit with one appeared first on The Cyber Security Place.

Cybersecurity: Billions Pour In, Basics Languish

2018’s headlines only underscored the need for robust data security. As if to add a whopping exclamation point to the end of the year, the massive Marriott/Starwood Resorts data breach (announced

The post Cybersecurity: Billions Pour In, Basics Languish appeared first on The Cyber Security Place.

Cybersecurity Experts Share Insight For Data Privacy Day 2019

You’ll have to forgive my ignorance—but what is an appropriate gift for Data Privacy Day? Perhaps an encrypted portable drive? That might not be a bad idea, but what I have

The post Cybersecurity Experts Share Insight For Data Privacy Day 2019 appeared first on The Cyber Security Place.

More regulation, more solutions needed: IoT device breaches continue to put user data at risk

Almost half of companies still can’t detect IoT device breaches, according to a Gemalto study. But, use of blockchain technology might provide a solution.’With IoT devices continuing to immerse themselves

The post More regulation, more solutions needed: IoT device breaches continue to put user data at risk appeared first on The Cyber Security Place.

Using Offender Profiling Techniques in Security Operations

Let’s start this article off with a question. What does Agent Smith from the Matrix, the Joker from Batman and Darth Vader from Star Wars all have in common? It’s

The post Using Offender Profiling Techniques in Security Operations appeared first on The Cyber Security Place.