Category Archives: INDUSTRY INSIGHTS

Why cybersecurity education matters

The shortage of qualified cybersecurity personnel is visibly apparent with the number of unfilled cybersecurity roles on the rise.Research shows cyber incidents have increased significantly since 2017 and according to a recent

The post Why cybersecurity education matters appeared first on The Cyber Security Place.

Cyber Security Risk in Retail and How to Handle It

Hackers and their tactics are continually evolving but one thing remains the same: retailers are prime targets for a cyber-attack. This is such a widespread issue that in nearly every

The post Cyber Security Risk in Retail and How to Handle It appeared first on The Cyber Security Place.

Advanced Customer Verification – Are You Ready For That?

Fraud is on the rise and attacks made by cybercriminals are becoming more sophisticated. Basic identity proofing is no longer effective, so it’s time for turning the clunky process into

The post Advanced Customer Verification – Are You Ready For That? appeared first on The Cyber Security Place.

Large Firms: What Role for the Group CISO?

The role of the CISO and their reporting line seems to be a continuing topic of discussion amongst cyber security professionals.The same title often hides a large diversity of roles,

The post Large Firms: What Role for the Group CISO? appeared first on The Cyber Security Place.

Cyber risk management: There’s a disconnect between business and security teams

Business managers want real-time cyber risk management metrics, but cybersecurity teams can only deliver technical data and periodic reports. That gap needs to close.A few years ago, cybersecurity professionals often

The post Cyber risk management: There’s a disconnect between business and security teams appeared first on The Cyber Security Place.

Business Continuity/Disaster Recovery – Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between

As a member of the IT team for Reed Exhibitions United States for the past five years, starting as a help desk analyst and now, a security analyst, I have

The post Business Continuity/Disaster Recovery – Hoping for the Best, Prepared for the Worst, and Unsurprised by Anything in Between appeared first on The Cyber Security Place.

Cybercriminals Have Your Business In Their Crosshairs And Your Employees Are In Cahoots With Them

Thus begins the ransomware email that could spell utter doom for your business. Think it can’t happen to you? You may want to think again. Cybercrime is big business. According

The post Cybercriminals Have Your Business In Their Crosshairs And Your Employees Are In Cahoots With Them appeared first on The Cyber Security Place.

Employees are Cyber Secure in Theory, But Not in Practice [Infographic]

Across the world, cybersecurity has moved from the shadows to center stage, due to increasing malware attacks and the soaring cost of resultant damages [predicted to rise to $6 trillion annually

The post Employees are Cyber Secure in Theory, But Not in Practice [Infographic] appeared first on The Cyber Security Place.

SecurityWeek RSS Feed: Why Fighting Card-Not-Present Fraud Remains an Ongoing Challenge

The recent takedown of the xDedic marketplace—where threat actors had been buying and selling access to compromised remote desktop protocol (RDP) servers since at least 2016 and that, according to authorities, had facilitated over $68 million USD in fraud—is the latest reminder that fraudulent card-not-present (CN

read more



SecurityWeek RSS Feed

Why Fighting Card-Not-Present Fraud Remains an Ongoing Challenge

The recent takedown of the xDedic marketplace—where threat actors had been buying and selling access to compromised remote desktop protocol (RDP) servers since at least 2016 and that, according to authorities, had facilitated over $68 million USD in fraud—is the latest reminder that fraudulent card-not-present (CN

read more

How deception changes the rules of engagement in cyber security

Carolyn Crandall, Chief Deception Officer at Attivo Networks, explores how deception techniques can provide not only early detection of malicious activity but also an invaluable insight into an attacker’s methods.Deception

The post How deception changes the rules of engagement in cyber security appeared first on The Cyber Security Place.

5 New Year’s Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape during the past years, it’s time for all of us in operational technology (OT) security to make firm decisions to do or not do something for the safety of our business and environment.

read more

2019 predictions – the year ahead for cybersecurity

2018 was a roller-coaster year for the tech industry – lots of big court cases and high-profile data privacy disagreements.2018 was a roller-coaster year for the tech industry – lots

The post 2019 predictions – the year ahead for cybersecurity appeared first on The Cyber Security Place.

More Money, More Worries About Cyber Risk

Executives at financial services companies are increasingly concerned about risks, but as technology becomes more integrated in managing financials, more executives say that cybersecurity is increasingly becoming the most important

The post More Money, More Worries About Cyber Risk appeared first on The Cyber Security Place.

Skill Squatting: The Next Consumer IoT Nightmare?

Connected devices are proliferating at a rapid rate, and this growth means that we’re only just beginning to scratch beneath the surface with potential use cases for Internet of Things (IoT) technology. IoT has quickly moved beyond basic internet-connected gadgets and wearables to more sophisticated interactive features like voice processing, which in turn has led to a significant rise in voice-activated devices such as smart speakers. 

read more

Enhance Your Security Posture Through Security Services

Cybercriminals are continually changing their attacks and techniques to stay ahead of security countermeasures. This continuous threat evolution has forced organizations to be consistently prepared to defend against something new at all times. Success relies on somehow anticipating the next threat to close the gap between its launch and being able to detect and stop it.

read more

The Devil You Know – How Idioms Can Relate to Information Security

The Mirriam-Webster dictionary defines the idiom “better the devil you know than the devil you don’t” as “it is better to deal with a difficult person or situation one knows

The post The Devil You Know – How Idioms Can Relate to Information Security appeared first on The Cyber Security Place.

The Devil You Know – How Idioms Can Relate to Information Security

The Mirriam-Webster dictionary defines the idiom “better the devil you know than the devil you don't” as “it is better to deal with a difficult person or situation one knows than with a new person or situation that could be worse.”  I’d like to examine this particular idiom, investigate its meaning more deeply, and understand how it relates to information security.

read more

Should enterprises delay efforts to remediate most vulnerabilities?

Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they protect themselves from today’s

The post Should enterprises delay efforts to remediate most vulnerabilities? appeared first on The Cyber Security Place.

Using Offender Profiling Techniques in Security Operations

Let’s start this article off with a question. What does Agent Smith from the Matrix, the Joker from Batman and Darth Vader from Star Wars all have in common? It’s

The post Using Offender Profiling Techniques in Security Operations appeared first on The Cyber Security Place.

Mis-valuation of data poses a huge threat to businesses

A business must fully understand the value of its data if it is to protect it properly. IT Security safeguards corporate data. It’s a widely accepted practice and commonplace in

The post Mis-valuation of data poses a huge threat to businesses appeared first on The Cyber Security Place.

New requirements for the secure design and development of modern payment software

The PCI Security Standards Council (PCI SSC) published new requirements for the secure design and development of modern payment software. The PCI Secure Software Standard and the PCI Secure Lifecycle (Secure SLC)

The post New requirements for the secure design and development of modern payment software appeared first on The Cyber Security Place.

Risk managers see cybersecurity as the biggest threat to business

Sword GRC canvassed amost 150 risk managers from highly risk-aware organizations worldwide for their opinions. Overall, cybersecurity was seen as the biggest risk to business by a quarter of organizations. Click here

The post Risk managers see cybersecurity as the biggest threat to business appeared first on The Cyber Security Place.

2018 Proved Highest Funding Year for Cybersecurity

Despite a 28% decrease in cybersecurity startups during 2017, global venture capital funding for cybersecurity rebounded with record high investments, according to Strategic Cyber Ventures. Though last year saw $5.3 billion

The post 2018 Proved Highest Funding Year for Cybersecurity appeared first on The Cyber Security Place.

Cyber risk management and return on deception investment

This article is fifth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of

The post Cyber risk management and return on deception investment appeared first on The Cyber Security Place.