Author Archives: The Cyber Security Place

Hack like a CISO

Developing the security officers’ processes, strategies and techniques for managing their time, resources and teams.I have written several times over the last couple of years about how the role of

The post Hack like a CISO appeared first on The Cyber Security Place.

GDPR has made life easier for cyberciminals

Removal of PII data from Whois records makes protecting Internet users increasingly difficult for security professionals. New research conducted by domain name and DNS-based cyber threat intelligence firm DomainTools has revealed that

The post GDPR has made life easier for cyberciminals appeared first on The Cyber Security Place.

What Tesla’s Spygate Teaches Us About Insider Threats

The saga involving a malicious insider at Tesla keeps getting stranger. Already there have been several fascinating twists and turns, well-chronicled in the press and on social media. Whatever the truth is,

The post What Tesla’s Spygate Teaches Us About Insider Threats appeared first on The Cyber Security Place.

Focus on security and standards to reap IoT rewards

Organisations are now investing billions in the Internet of Things (IoT) to create business efficiencies and improve productivity. Gartner claims that over a third (37 per cent) of the 8.4

The post Focus on security and standards to reap IoT rewards appeared first on The Cyber Security Place.

Five network security threats facing retail – and how to fight them

Digital networks are now the backbone of every retail operation. But they are also a very attractive target for cyber criminals. Paul Leybourne of Vodat International examines the key cyber

The post Five network security threats facing retail – and how to fight them appeared first on The Cyber Security Place.

Shrouding IoT Security in the Fog

The world is undergoing the most dramatic overhaul of our information service infrastructure ever, driven by the “connected everything” movement.While the benefits of connected data are indisputable – better decisions

The post Shrouding IoT Security in the Fog appeared first on The Cyber Security Place.

Security by Design – Future-Proof

How does one “future-proof” a security program? What does “future-proof” even mean? “Future Proof” refers to an organization, business, program or product that performs all of the right jinks (moves)

The post Security by Design – Future-Proof appeared first on The Cyber Security Place.

Protecting a Mobile Workforce with Hybrid DNS Security

It is expected that half of the UK’s workforce will be working remotely by 2020, accessing the corporate network via mobile devices and the cloud. If true, this prediction is likely to

The post Protecting a Mobile Workforce with Hybrid DNS Security appeared first on The Cyber Security Place.

GDPR Hurts Security but Publicity Might Help

A survey of 900 security professionals conducted by AlienVault at Infosecurity Europe found that spending on GDPR compliance efforts has hindered threat detection but cybersecurity publicity might actually benefit the industry. Additionally,

The post GDPR Hurts Security but Publicity Might Help appeared first on The Cyber Security Place.

Blockchain: Only As Good As Its Data

Blockchain has without a doubt created a lot of discussion as the next big thing, especially in supply chain. Before blockchain can become the next tech blockbuster, there are several

The post Blockchain: Only As Good As Its Data appeared first on The Cyber Security Place.

Taken by Ransomware? Certain Skills Required

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

The post Taken by Ransomware? Certain Skills Required appeared first on The Cyber Security Place.

Are security professionals moving fast enough?

Anthony O’Mara, from Malwarebytes, explains to Information Age why security professionals need to move much faster to beat cyber criminals. With the increase in threats the cybersecurity industry faces, alongside

The post Are security professionals moving fast enough? appeared first on The Cyber Security Place.

Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable

Cryptocurrency is all the rage right now. There are currently over 1,600 different cryptocurrencies in circulation with a combined value approaching $350 billion.The top three cryptocurrencies alone—Bitcoin, Ethereum, and Ripple—are worth more

The post Eight Weak Links that Make Cryptocurrency Exchanges Vulnerable appeared first on The Cyber Security Place.

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. Just when we thought we were

The post Staying secure as the IoT tsunami hits appeared first on The Cyber Security Place.

Five Steps to Security Automation

Two weeks ago, Volvo, the Swedish automaker, announced plans for a Level 4 self-driving car by 2021. In the progression of automation levels for cars, as outlined by the National Highway Traffic

The post Five Steps to Security Automation appeared first on The Cyber Security Place.

The Most Common Hack Is Also the Most Successful. Here’s How to Fight It

Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren’t

The post The Most Common Hack Is Also the Most Successful. Here’s How to Fight It appeared first on The Cyber Security Place.

Is a UTM Appliance the Right Security Solution for Your Business?

A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. UTM appliances provide an

The post Is a UTM Appliance the Right Security Solution for Your Business? appeared first on The Cyber Security Place.

Hacker-powered security is reaching critical mass

HackerOne announced findings from the 2018 Hacker-Powered Security Report, based on over 72,000 resolved security vulnerabilities, 1,000 customer programs and more than $31 million in bounties awarded to hackers from

The post Hacker-powered security is reaching critical mass appeared first on The Cyber Security Place.

Digital transformation – why your whole approach to security has to change

Darron Gibbard, Managing Director EMEA North of Qualys, explains to Information Age why organisations must overhaul their approach to security in order to achieve success in digital transformation. By making security

The post Digital transformation – why your whole approach to security has to change appeared first on The Cyber Security Place.

Departing Employees Should Not Mean Departing Data

Empowering your employees to do their best work means providing them access to physical and digital assets in the company network that can help them scale their initiatives. But when

The post Departing Employees Should Not Mean Departing Data appeared first on The Cyber Security Place.

What is the Tor Browser? How it works and how it can help you protect your identity online

Move over “dark web,” the Tor Browser will keep you safe from snoops. The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it

The post What is the Tor Browser? How it works and how it can help you protect your identity online appeared first on The Cyber Security Place.

File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods.

The post File-Based Malware: Considering A Different And Specific Security Approach appeared first on The Cyber Security Place.

Employees suffering high levels of ‘cyber stress’ in the workplace

A Kaspersky Lab study revealed that news of data breaches and pressures to manage multiple online accounts are causing German employees increased levels of stress. Click here to view original

The post Employees suffering high levels of ‘cyber stress’ in the workplace appeared first on The Cyber Security Place.