Author Archives: The Cyber Security Place

No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

Over the coming years, the very foundations of today’s digital world will shake – violently. Innovative and determined attackers, along with seismic changes to the way organizations conduct their operations,

The post No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats appeared first on The Cyber Security Place.

A Smarter Approach to Security Will Reduce the Risk of Malware

Despite the cybersecurity industry advancing at a promising rate, malware continues to plague organizations. In fact, it was found that the majority of data breaches have happened after a malware infected attachment

The post A Smarter Approach to Security Will Reduce the Risk of Malware appeared first on The Cyber Security Place.

SMBs Fear Phishing, Fall Short on Cyber Training

In surveying 500 small to medium-sized businesses (SMBs) across the US, Webroot discovered that many fail to recognize the many cybersecurity threats their businesses face, in large part because they lack in-house

The post SMBs Fear Phishing, Fall Short on Cyber Training appeared first on The Cyber Security Place.

Maliciuos hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on

The post Maliciuos hacking activity increasingly targeting critical infrastructure appeared first on The Cyber Security Place.

Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, and an acute shortage of skilled

The post Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence appeared first on The Cyber Security Place.

Hardware Security Revisited

As Spectre and Meltdown demonstrated earlier this year, hardware is no less vulnerable to attack than any other system because hardware is an often overlooked piece of the security puzzle.  Security and

The post Hardware Security Revisited appeared first on The Cyber Security Place.

State Department Email Breach Hit Hundreds of Staff

The US State Department has confirmed an email security breach which may have affected hundreds of employees, exposing their personal information to attackers. Reports emerged on Monday that the incident

The post State Department Email Breach Hit Hundreds of Staff appeared first on The Cyber Security Place.

Hackers as Heroes: How Ethical Hacking is Changing the Industry

Hackers all around the world have long been portrayed in media and pop culture as the bad guys. Society is taught to see them as cyber-criminals and outliers who seek

The post Hackers as Heroes: How Ethical Hacking is Changing the Industry appeared first on The Cyber Security Place.

How Digital Transformation can Save Cybersecurity

Traditional security controls, now too manual and slow to keep pace with digital business processes, customer experiences and workflows are being relegated to the compliance toolbox.  They will satisfy regulators,

The post How Digital Transformation can Save Cybersecurity appeared first on The Cyber Security Place.

Facebook Increases Security For Political Campaign Staff

Facebook is introducing new security tools for political campaign staff, concerned about dirty tricks in the run-up to the mid-term elections. On his personal Facebook page, CEO Mark Zuckerberg admitted

The post Facebook Increases Security For Political Campaign Staff appeared first on The Cyber Security Place.

Is There a Talent Gap in Cybersecurity?

Current challenges in the cybersecurity industry have less to do with technological limitations and more to do with a shortfall in human capital. Cybersecurity firms are staring at an encroaching

The post Is There a Talent Gap in Cybersecurity? appeared first on The Cyber Security Place.

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

The post A guide to cyber attacks: Denial of Service – Part 3 appeared first on The Cyber Security Place.

Security as the new innovation enabler

Ian Jenkins, Director, Network & Security -UK&I, VMware discusses in Information Age why we need to re-engineer our fundamental security model and consider security and innovation in tandem. The new normal

The post Security as the new innovation enabler appeared first on The Cyber Security Place.

Why Are We Still Talking About the Reporting Line of the CISO?

Why are so many organisations and security professionals still worried about the reporting line of the CISO? This is one of the oldest and most consistent debate agitating the security industry, and

The post Why Are We Still Talking About the Reporting Line of the CISO? appeared first on The Cyber Security Place.

Analysis of half-a-billion emails reveals malware-less email attacks are on the rise

FireEye analyzed over half-a-billion emails from 1H 2018, and found that 32% of email traffic seen in the first half of 2018 was considered ‘clean’ and actually delivered to an

The post Analysis of half-a-billion emails reveals malware-less email attacks are on the rise appeared first on The Cyber Security Place.

“Zero Trust” Is the Opposite of Business

The term zero trust has been cropping up a lot recently, with even a small conference on the topic recently. It sounds like an ideal security goal, but some caution is warranted.

The post “Zero Trust” Is the Opposite of Business appeared first on The Cyber Security Place.

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

The post Personal mobile devices are the biggest threat to your network appeared first on The Cyber Security Place.

Why Are Businesses Ignoring Security Threats?

A surveyed compiled at the RSA security conference showcases that lots of businesses are behind with proper security standards. Some company’s are completely ignoring security threats due to lack of

The post Why Are Businesses Ignoring Security Threats? appeared first on The Cyber Security Place.

Application Security: How to Secure the Many Apps in Your Enterprise

Today’s enterprises are struggling to secure their applications. With thousands of applications in use and new threats emerging daily, large organizations face a monumental task. Compounding matters is the fact

The post Application Security: How to Secure the Many Apps in Your Enterprise appeared first on The Cyber Security Place.

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

The post Phished credentials caused twice as many breaches than malware in the past year appeared first on The Cyber Security Place.

Cybersecurity as catalyst for greater adoption of agile development

Agile development increases the output of software development projects by using a faster, more iterative engineering process. This pace also allows rapid course correction, which is great for meeting customer

The post Cybersecurity as catalyst for greater adoption of agile development appeared first on The Cyber Security Place.