GDPR Is Coming Fast – Are You Ready To Catch This Train?

When the European Union’s General Data Protection Regulations (GDPR) becomes enforceable, many firms in the US will still not prepared to meet the needs of the regulation come May 25, 2018 – but the penalties for non-compliance are significant for businesses.

Machine Learning And The 5 Key Elements Of A Layered Defense

While machine learning, an application of artificial intelligence, is not new, customers still struggle to understand how it will benefit their efforts to defend their critical assets. When evaluating this technology, here are the five key components that are critical to effective machine learning and successful protection of the endpoint.

Staying Current On The Changing Threat Landscape: The Role Of The National Vulnerability Database (NVD)

The National Vulnerability Database (NVD is a leading source of intelligence on vulnerabilities for InfoSec professionals, and while it provides many benefits, it also has its limitations. This article will explain the advantages of using the NVD for vulnerability management, point out some of the blind spots that have occurred recently, and recommend best practices for successful mitigation.

Two Is Usually Better Than One, But With 2FA It Might Not Be

A new strain of mobile malware, known as FakeBank, has been discovered by security researchers from Trend Micro. The new malware has been found in several SMS/MMS management software apps and is designed to steal banking information and funds. How do you detect these fraudulent transactions before they create a financial nightmare consumers and companies?

Busting The 7 Myths About Cybersecurity Careers

There are many issues confounding and complicating raising the next generation of technologists. Seven myths exist about technology careers discourage potential teenage technologists and their parents. As a leader of a philanthropic organization dedicated to creating on-ramps to tech careers, Charles Eaton considers busting those myths not only a duty, but a pleasure. Charles tackles these seven myths one-by-one here in his latest ITSPmagazine Experts Corner.

Medical Device Diversity Is A Critical Factor For Healthcare IT

When it comes to medical devices deployed in clinical environments, diversity is a key factor. The reality is that not only are the medical devices manufactured by many different companies, but the underlying operating systems and software applications running on these devices are also incredibly diverse.

Cryptocurrency Mining Is Booming, And So Is Its Malware

The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.

We Are All A Cyber Fraud Target. 5 Tips To Help You To Be Cyber Secure.

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

Happy Valentines Day! Here Is A Bouquet Of Online Dating Romance Scams. XOXO

As more adults flock to online dating sites to meet "the one" they must also exercise caution. A new generation of scammers are setting their traps, creating fake profiles to extort cash and mine personal data from victims.

Let’s Take A Look At Some Recent Cryptocurrency Scams

Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.

The Cyber Attacks NOT Making Headlines Are The Scary Ones

The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.

Mobile Apps, Your Data, and your digital Shadow

Mobile Apps are used every day without a second thought. But convenience comes at a cost. You may want to think twice before you download.

Darn It, Did You Really Miss The Gorilla?

From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”

Nearly Half of SMBs Plan to Invest in Cybersecurity in 2018

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.

GDPR Will Have A Big Impact On Small And Medium Business - Part 3

Welcome to the last of our three-part GDPR series. In this post we’ll dive deeper into a few more key concepts, like individual rights, data controllers vs. data processors (and how you can determine which one you are), and the new 72-hour rule for data breach reporting.

Is Anything Really Safe In The Virtual World We’ve Created?

Jessica Lang from Kaizen reveals the ten cyber attacks that have rocked the world in recent years, and hit 5.4 billion accounts in total.

It Looks Like Your SMB Needs A New List Of Cybersecurity Resolutions

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

Would You Steal Data That Cannot Be Used?

From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?

GDPR: Do Not Forget About PII Data In Your Non-Production Environment Such As Legacy, Archive, Development, And Test

On May 25, 2016, the GDPR (General Data Protection Regulation) became law in 28 European countries, marking the arrival of the biggest piece of legislation ever created on a Global scale. We are now rapidly approaching the date when enforcement of the new law will commence in 2018. The most important and significant thing to remember about the regulation is its global scope — this means that wherever you are in the world, if you hold or process personal data of Europeans, then you and your company must comply.

Detected: A Movie, IoT, Wearable Tech, Breast Cancer, And Cisco?

One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.