For true cybersecurity you must know what employees are doing

By Michelle Drolet . 2 Mar 2018

A look at some options for keeping tabs on your staff and the possible pros and cons. Securing your data in the digital age is very challenging, but it has never been more necessary. We just looked at the hair-raising cost of a data breach in 2018 and we know that employees are often the weakest … Continue reading For true cybersecurity you must know what employees are doing

Corporate     Cyberattack    

The Cost of a Data Breach in 2018

By Michelle Drolet . 30 Jan 2018

58 data records are stolen every second at an average cost of $141 each. Trading in intellectual property and personal data is so widespread that someone invented a calculator that can estimate the potential harm to your own business. Nearly 5 million data records are lost or stolen worldwide every single day, according to the … Continue reading The Cost of a Data Breach in 2018

Scan the Dark Web for Threat Intelligence

By Michelle Drolet . 3 Jan 2018

It may be possible to glean valuable security insights by monitoring the dark web.   Although awareness of the importance of cybersecurity is spreading, the number of successful cyber-attacks continues to grow with every passing year. Globally, almost 1.9 billion data records were compromised in the first half of 2017, up 164% compared to the … Continue reading Scan the Dark Web for Threat Intelligence

8 Cybersecurity Trends to Watch for in 2018

By Michelle Drolet . 12 Dec 2017

New challenges and threats will face IT departments in the year ahead. As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll … Continue reading 8 Cybersecurity Trends to Watch for in 2018

Can machine learning be used to shore up cyber defenses?

By Michelle Drolet . 27 Nov 2017

Deep learning can be a vital supplementary tool for cybersecurity. The meteoric rise of malware has put us all at risk. We are engaged in a never-ending race with cybercriminals to protect systems, plug gaps, and eradicate vulnerabilities before they can gain access. The front line grows by the day as we share more data and employ … Continue reading Can machine learning be used to shore up cyber defenses?

Cyberattack    

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

By Michelle Drolet . 17 Nov 2017

Coming to a future near you: software code that mutates and evolves. We often talk about computer systems and information security in biological terms. Threats and defenses evolve, viruses run rampant, and machines learn by emulating the neural networks in our brains. Cybersecurity is an endless war between attackers and defenders, just as biology is … Continue reading The Darwin defense: can ‘genetic algorithms’ outsmart malware?

5 questions to ask your CEO about cybersecurity

By Michelle Drolet . 31 Oct 2017

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to … Continue reading 5 questions to ask your CEO about cybersecurity

Making a bad situation worse: how Equifax mishandled the breach

By Michelle Drolet . 28 Sep 2017

Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not. There have been some very high-profile data breaches in the last few years, but the latest disaster to hit the headlines concerns one of the largest credit bureaus in the United States. It’s estimated that the Equifax data breach exposed 143 million consumers, with … Continue reading Making a bad situation worse: how Equifax mishandled the breach

Build it right with NIST’s Cybersecurity Framework

By Michelle Drolet . 13 Sep 2017

Diving into NIST Special Publication 800-53 for practical advice. We’ve already laid out a broad overview of what NIST’s cybersecurity framework can do for you, so today we’re going to drill into Special Publication 800-53. Published by the National Institute of Standards and Technology, and based on important research from the Information Technology Laboratory, this publication offers … Continue reading Build it right with NIST’s Cybersecurity Framework

What NIST’s Cybersecurity Framework is and why it matters

By Michelle Drolet . 17 Aug 2017

Practical advice to help you build a solid InfoSec plan The risk of your business falling victim to cybercrime has never been higher. Despite a seemingly endless parade of high profile data breaches, ransomware attacks, and phishing scams, many organizations still lack the necessary defenses to identify, prevent, or recover from an attack. The trouble … Continue reading What NIST’s Cybersecurity Framework is and why it matters

Tags