Top

Tag: Cybersecurity


Network security, Security

Justifying your 2021 cybersecurity budget

September 18, 2020

Via: Help Net Security

Sitting in the midst of an unstable economy, a continued public health emergency, and facing an uptick in successful cyber attacks, CISOs find themselves needing to enhance their cybersecurity posture while remaining within increasingly scrutinized budgets. Senior leadership recognizes the […]


Network security, Security

Back to Basics: Creating a Culture of Cybersecurity at Work

September 16, 2020

Via: Security Intelligence

The importance of security culture can be seen now more than ever. Many of us work remotely; there are app concerns; and the lines between personal and business use of devices and networks are blurred, challenging our cyber resilience. Therefore, […]


Network security, Security

Creating a Cybersecurity Culture Starts With Your Team

September 9, 2020

Via: Security Intelligence

As cyberattacks become more prevalent and sophisticated, companies must put more faith in their employees to make sure they don’t put data at risk or fall victim to ransomware. But, employees are busier than ever. And, creating a cybersecurity culture […]


Mobile, Network security, Privacy protection, Security

Recommendations to enhance subscriber privacy in 5G

September 4, 2020

Via: Help Net Security

There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. Addressing privacy risks The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is […]


Mobile, Mobile security, Privacy protection

Mobile voting: Hype or reality?

September 4, 2020

Via: Help Net Security

The 2020 United States presidential election is already off to a rocky start. We’ve seen technology fail in the primary elections, in-person campaigning halted, and a plethora of mixed messages on how voting will actually take place. Many Americans are […]


Network security, Security

Which cybersecurity failures cost companies the most and which defenses have the highest ROI?

September 3, 2020

Via: Help Net Security

Massachusetts Institute of Technology (MIT) scientists have created a cryptographic platform that allows companies to securely share data on cyber attacks they suffered and the monetary cost of their cybersecurity failures without worrying about revealing sensitive information to their competitors […]


Network security, Security

Top Cybersecurity Challenges Facing Government Agencies

September 3, 2020

Via: Radware Blog

Government institutions require online applications to streamline processes, provide content and cut costs. The growth of online services and web-based content introduces new challenges to federal, state and local agencies that need to address issues like 24×7 access to critical […]


Network security, Security

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

August 25, 2020

Via: Security Intelligence

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations […]


Threats & Malware, Vulnerabilities

Disrupting a power grid with cheap equipment hidden in a coffee cup

August 20, 2020

Via: Help Net Security

Cyber-physical systems security researchers at the University of California, Irvine can disrupt the functioning of a power grid using about $50 worth of equipment tucked inside a disposable coffee cup. Mohammad Al Faruque, UCI associate professor of electrical engineering and […]


Network security, Security

What enterprises should consider when it comes to IoT security

August 20, 2020

Via: Help Net Security

Yet despite this proven success, security concerns have historically been a barrier to IoT adoption for enterprises. In fact, more than 50% of organizations say that security is a main reason they have not taken advantage of IoT. Fortunately, with […]