by Deveren Werne | Oct 7, 2016 | Cybersecurity, Data Breaches
Cyber Risk – Technical and Process Controls for the Enterprise Must Extend to Employees and How They Engage in Personal Services The ubiquitous use of social media has blurred the lines between business and personal lives. A lot has been written about the...
by Lance Roberts | Sep 2, 2016 | Access Control, Cybersecurity, Data Breaches, Network Security
Data Breaches The cost of data breaches is rising for companies around the world as sophisticated thieves target valuable financial and medical records, according to a study released on Wednesday. The total average cost of a data breach is now $3.8 million, up from...
by Deveren Werne | Jul 8, 2016 | Cybersecurity
Enterprise Security Teams Must Think More About How to Reduce Big Data Into Real-time Answers Security teams are always looking for new and efficient ways to find threats, and the emerging field of security analytics is proving to be one of the most promising areas of...
by Deveren Werne | Jun 10, 2016 | Cybersecurity, Security
Stickers and slides serve to ease concerns that spooks could be watching our every move, as even the FBI director says he puts tape on his cameras For the past half decade, the technology industry has been racing to build better cameras into the hardware we use...
by Lance Roberts | May 5, 2016 | Cybersecurity, Technology News
“We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that...
by Lance Roberts | Apr 22, 2016 | Cybersecurity, Network Security, Technology News
Hackers Hackers have been known to use all manner of remote access tools to break into mobile phones, often by finding vulnerabilities in an operating system like Android or even in SIM cards. It’s more rare to try and tap into the network infrastructure that routes...
Recent Comments