Category Archives: INDUSTRY INSIGHTS

SecurityWeek RSS Feed: How Well Are You Protecting Your Brand from Digital Risk?

Without an online presence an organization doesn’t exist, and having a website is just the baseline. Today, an organization’s Internet presence has expanded to include other digital channels. Companies of all sizes are actively using social media to engage with customers and build loyalty for their brand.

read more



SecurityWeek RSS Feed

Cybersecurity Tools That Every Business Should Consider in 2019

Businesses ignoring cyber security has become a thing of the past. With the sudden increase in cyber-attacks and data breaches, cybersecurity remains at the front of many business leaders’ minds.

The post Cybersecurity Tools That Every Business Should Consider in 2019 appeared first on The Cyber Security Place.

Bug Hunting Is Cybersecurity’s Skill of the Future

The vast majority of white hat hackers who reported that they were looking for jobs in cybersecurity said that their bug hunting experience helped them land a job, according to Bugcrowd’s 2018

The post Bug Hunting Is Cybersecurity’s Skill of the Future appeared first on The Cyber Security Place.

NHS could face major cybersecurity threats due to lack of investment

FOI request finds lack of cybersecurity readiness in many NHS trusts.Redscan has asked NHS trusts about the cybersecurity readiness of its employees and the results show lack of trained staff, lack of

The post NHS could face major cybersecurity threats due to lack of investment appeared first on The Cyber Security Place.

10 cyber security trends to look out for in 2019

2018 was an interesting year for all things cyber.  It was the year that brought major breaches pretty much every week. Most recently, the Marriott Hotel group suffered a significant

The post 10 cyber security trends to look out for in 2019 appeared first on The Cyber Security Place.

Why the CISO’s Voice Must be Heard Beyond the IT Department

In a recent company board strategy meeting the CFO presented the financial forecast and outcome and made some interesting comments about fiscal risks and opportunities on the horizon. The COO

The post Why the CISO’s Voice Must be Heard Beyond the IT Department appeared first on The Cyber Security Place.

#2018InReview Security Culture

Companies understand that organizational culture is an important differentiator to set their company apart from the competition. However, joining the dots between culture and information security management has taken some

The post #2018InReview Security Culture appeared first on The Cyber Security Place.

Securing industrial control systems by closing the air gap security loophole

Air-gapping is one of the most common ways ICS are protected, however, organisations’ interpretation of how to isolate networks often varies.Security and industry experts have long advocated for the need

The post Securing industrial control systems by closing the air gap security loophole appeared first on The Cyber Security Place.

Cyber risk management continues to grow more difficult

New research shows that cyber risk management is more difficult now than it was two years ago. Primary causes include increasing workloads, sophisticated threats, and more demanding business executives.Cyber risk

The post Cyber risk management continues to grow more difficult appeared first on The Cyber Security Place.

SecurityWeek RSS Feed: How to Reduce False Positives and Move Faster on What Matters

A quick Google search reveals instances of false positives happening every day. A signal from NASA’s Opportunity rover that remained unresponsive for months after experiencing a dust storm on Mars, turned out to be a “ghost signal.” Blue cotton candy that initially tested positive as methamphetamine turned out to be, well, blue cotton candy. Numerous articles on false positive medical test results that subject individuals to unnecessary follow-up, treatments, cost and worry. 

read more



SecurityWeek RSS Feed

How to Reduce False Positives and Move Faster on What Matters

A quick Google search reveals instances of false positives happening every day. A signal from NASA’s Opportunity rover that remained unresponsive for months after experiencing a dust storm on Mars, turned out to be a “ghost signal.” Blue cotton candy that initially tested positive as methamphetamine turned out to be, well, blue cotton candy. Numerous articles on false positive medical test results that subject individuals to unnecessary follow-up, treatments, cost and worry. 

read more

Are Lawyers the Best Judge of Cybersecurity?

I had to do a double-take when I read that Japan’s deputy chief of government cybersecurity strategy, Yoshitaka Sakurada said he has never used a computer. That pretty quickly became a

The post Are Lawyers the Best Judge of Cybersecurity? appeared first on The Cyber Security Place.

Healthcare Cybersecurity

The healthcare industry is one of the biggest targets for hackers and other bad actors, given the massive amount of personal data these organizations have in their possession and the

The post Healthcare Cybersecurity appeared first on The Cyber Security Place.

Things To Understand To Prevent Data Loss

By Julia Sowells Senior Information Security Specialist at Hacker Combat, Customer data is the lifeblood of any business entity; they are driven towards the increasing obligation of securing it as they

The post Things To Understand To Prevent Data Loss appeared first on The Cyber Security Place.

Cybersecurity Threats Keep Evolving, Research Shows

Cybersecurity industry research is a great way to stay on top of the latest threats — and the controls that can keep those vulnerabilities from affecting your organization. Research released

The post Cybersecurity Threats Keep Evolving, Research Shows appeared first on The Cyber Security Place.

The Importance of “S” in “CISO”

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization,

The post The Importance of “S” in “CISO” appeared first on The Cyber Security Place.

Red-hot cyber: 5 cyber security startups next in line for the Unicorn Crown

Following the warning from MPs that the UK is ‘wholly’ unprepared to stop a devastating cyber attack, Information Age looks at the top cyber security start-ups. With big-tech companies looking

The post Red-hot cyber: 5 cyber security startups next in line for the Unicorn Crown appeared first on The Cyber Security Place.

Online Shopping Safety Tips For The Holidays

The holidays are just around the corner and the rush to purchase gifts online is well under way. While retailers scramble to create eye-catching promotions, deep in the underground, the

The post Online Shopping Safety Tips For The Holidays appeared first on The Cyber Security Place.

UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure

The joint committee on national security strategy called the current security leadership ‘wholly inadequate’. A UK parliamentary committee has urged the government to appoint a dedicated cyber security minister to

The post UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure appeared first on The Cyber Security Place.

SecurityWeek RSS Feed: When to Cut Your Losses on a Wasteful Security Project

In a December 2011 Forbes article entitled "How To Waste $100 Billion: Weapons That Didn't Work Out", author Loren Thompson discusses a number of government weapons programs that were scrapped after billions of dollars were sunk. The circumstances under which each project went south vary, but they do share one very interesting point in common.

read more



SecurityWeek RSS Feed

Center for Connected Medicine Polls Top Health Systems About 2019 Priorities

Cybersecurity is still the big one. But interoperability and telehealth are not far behind for leading organizations’ technology goals. The Center for Connected Medicine polled IT executives across 38 health

The post Center for Connected Medicine Polls Top Health Systems About 2019 Priorities appeared first on The Cyber Security Place.

China Chip Hack Shines Spotlight on Hardware and Supply-Chain Risk

By Jimmy Astle, Senior Threat Reseracher, and Paul Drapeau, Enterprise Architect – Security Efficacy at  Carbon Black, Recent revelations in the press from Bloomberg regarding Chinese hardware implants and supply-chain compromise

The post China Chip Hack Shines Spotlight on Hardware and Supply-Chain Risk appeared first on The Cyber Security Place.

DDoS Attack Volumes Increase By 110% In Q3 2018, According To Link11’s New Report

Link11, a cyber security firm, has released its Q3 DDoS Report, revealing that the scale and volume of DDoS attacks continued to grow in Europe during Q3 2018. The Link11

The post DDoS Attack Volumes Increase By 110% In Q3 2018, According To Link11’s New Report appeared first on The Cyber Security Place.

Securing your company’s supply chain with objective information

By Ewen O’Brien, EMEA Director at  BitSight Understanding the risk posed by third- and fourth-party companies can help mitigate security problems In light of the almost daily news of companies

The post Securing your company’s supply chain with objective information appeared first on The Cyber Security Place.

Instagram Bug, Now Fixed, Exposed User Passwords

A security flaw in Instagram’s Download Your Data, a tool released in April this year, reportedly could have exposed user passwords, but the bug has now been fixed, according to

The post Instagram Bug, Now Fixed, Exposed User Passwords appeared first on The Cyber Security Place.

Cyber Security Implementation: Firms Want It, But Less Do It, Finds Survey

Most respondents to a survey says cyber security implementation is critical, but only half think they are resilient enough to protect against cyber attacks. Despite 99% of respondents stating that

The post Cyber Security Implementation: Firms Want It, But Less Do It, Finds Survey appeared first on The Cyber Security Place.

Cybersecurity Is Getting Its Own Agency

Without any notable opposition to the Senate’s version of the bill, the House agreed to a reorganization of the Cybersecurity and Infrastructure Security Agency (CISA) Act earlier this week, according

The post Cybersecurity Is Getting Its Own Agency appeared first on The Cyber Security Place.

Protect your data… or face the chopping board

Poor security controls that contribute to a security failing and resulting data breach will lead to people losing their jobs. ‘By analysing people’s email behaviour, smart technology can now recognise

The post Protect your data… or face the chopping board appeared first on The Cyber Security Place.

HITRUST Common Security Framework – Improving Cyber Resilience?

A few weeks ago, Anthem agreed to a record $16 million HIPPA settlement with federal regulators to close the chapter on a data breach that exposed data on nearly 79 million individuals

The post HITRUST Common Security Framework – Improving Cyber Resilience? appeared first on The Cyber Security Place.

Building a Security Awareness Program

At the second annual Infosecurity North America conference at the Jacob Javits Convention Center in New York, Tom Brennan, US chairman, CREST International, moderated a panel called Securing the Workforce: Building, Maintaining and Measuring

The post Building a Security Awareness Program appeared first on The Cyber Security Place.

HITRUST Common Security Framework – Improving Cyber Resilience?

A few weeks ago, Anthem agreed to a record $16 million HIPPA settlement with federal regulators to close the chapter on a data breach that exposed data on nearly 79 million individuals in 2015. This payment is in addition to the $115 million Anthem shelled out as part of a class-action lawsuit over the same breach in 2017.

read more

Despite rise in security awareness, employees’ poor security habits are getting worse

Despite an increased focus on cybersecurity awareness in the workplace, employees’ poor cybersecurity habits are getting worse, compounded by the speed and complexity of the digital transformation. Of the 1,600 global employees Vanson

The post Despite rise in security awareness, employees’ poor security habits are getting worse appeared first on The Cyber Security Place.

Cybersecurity and ethical data management: Getting it right

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerized world of ours loves

The post Cybersecurity and ethical data management: Getting it right appeared first on The Cyber Security Place.