Tagged - cybersecurity

FiRe 2018 in Review, Part II: "Transformational Technologies"

In part two of the FiRe conference review, we continue our session synopses, including The Future of Identity & Online Privacy, World Interrupted: The Cyber...

Selling GDPR Compliance: How Stricter Regulations Can Help to Streamline Incident Response Communications for the Retail Sector

Retailers can use the European Union’s General Data Protection Regulation as a template to begin planning their organization’s incident response communication plan in the...

Baking Cybersecurity Into the Cannabis Industry

The cannabis market is undergoing explosive growth in all directions. Traditional strategic approaches to information security are unlikely to keep up in an era of...

Nonprofit Organizations – Use This One Weird Trick to Know If You Have Been Hacked

Nonprofit organizations need to be frugal with their funding, but that doesn’t mean they need to live in blissful ignorance when it comes to cybersecurity. Honeypots can...

Hacking Voting Machines: Democracy and Elections Are at Risk

Voting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start...

Are Your Industrial Control Systems Safe From Ransomware?

Recent nation-state attacks and proof-of-concept malware against industrial control systems demonstrate that ransomware is an emerging threat to the energy sector....

EFAIL: Why You SHOULDN'T Remove PGP and SHOULD Manage Your Threat Models

This PowerPoint deck summarizes the recently publicized OpenPGP and S/MIME vulnerability known as EFAIL and recommends actions that users can take to boost security.

Identity and Access Management for Connected Cars: Finding the Balance Between Security and User Experience

Technologies like IoT have risen in popularity greatly over the last few years. The automotive industry is now faced with the opportunity to incorporate these...

Reduce the Likelihood and Impact of a Breach in the Chemical Sector by Focusing on the End Users

While all industries are at risk of being targeted by threat actors of any kind, the chemical sector is at an increased risk due to the sensitive information they store...

Why Board Members Should Care About (Cyber) Security

Telecoms are an attractive target to attackers – whether they know it or not. Board members can be a critical ally to the organization in getting cybersecurity strategies...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us