The Cyber Security Place

5,259 Flips | 1 Magazine | 18 Followers | @CyberSecurityPl | Keep up with The Cyber Security Place on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “The Cyber Security Place”

IoT malware sees major rise

Not even your washing machine is safe from new threats, Kaspersky warns. The number of malware targeting Internet of Things (IoT) devices is …

Washing Machines

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague SMBs.Hello, dedicated readers! My blog is back from a …

Cape Cod

Executives waking up to cyber threats: how should they approach them?

Yaniv Valik, VP at Continuity Software, explains why cyber threats are no longer just for the IT department to worry about as executives finally wake …

Security priorities are shifting in response to increased cybersecurity complexity

The increased complexity of the IT environment, combined with increasingly sophisticated attacks and a rapidly evolving threat landscape, is causing …

Complexity

No Time for Complacency: Watch Your Back on Biometrics, Compliance, and Insider Threats

Over the coming years, the very foundations of today’s digital world will shake – violently. Innovative and determined attackers, along with seismic …

Biometrics

Building security into DevOps versus bolting it on

In this podcast, Hari Srinivasan, Director of Product Management for Qualys, talks about building security into DevOps versus bolting it on, …

Product Management

Cybersecurity Can Boost Plant Productivity

Operationalizing cybersecurity has been a major challenge for oil and gas engineers to date. With their primary priority to maintain uptime, these …

Oil & Gas Industry

The Security Costs of Cloud-Native Applications

More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security? Businesses are …

Security

Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT …

Artificial Intelligence

Maliciuos hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the …

Hacking

Mobile Security For The Modern Workplace: How To Boost Remote Productivity While Remaining Secure

The continued white-hot proliferation of personal devices has led to businesses adopting cultures where employees can contribute remotely, using …

BYOD

Building an Integrated IT/OT Security Program: Notes From the Field

Let’s start this column with some good news. I speak with dozens of enterprises every month about security (or lack thereof) in their operational …

Security

Facebook Increases Security For Political Campaign Staff

Facebook is introducing new security tools for political campaign staff, concerned about dirty tricks in the run-up to the mid-term elections. On his …

Mark Zuckerberg

How Digital Transformation can Save Cybersecurity

Traditional security controls, now too manual and slow to keep pace with digital business processes, customer experiences and workflows are being …

Digital Transformation

Hackers as Heroes: How Ethical Hacking is Changing the Industry

Hackers all around the world have long been portrayed in media and pop culture as the bad guys. Society is taught to see them as cyber-criminals and …

Ethical Hacking

How to create a Hall of Fame caliber cybersecurity playbook

Whether the sport is football, basketball or hockey, all the best coaches have playbooks and reports with the latest information on opponents. They …

Hall of Fame

Seizing cyber resilience mastery in financial services

Despite the volume of cyberattacks doubling in 2017, financial services firms are closing the gap on cyberattacks, having stopped four in five of all …

Financial Services

Awareness and tendency towards risky online behavior

​Spanning Cloud Apps announced the results of a survey of over 400 full-time U.S. employees on their awareness of and tendency towards risky online …

Data Management

Future UK Cyber Security Stars Tackle Vulnerable Cryptocurrency in Latest Challenges

On Friday, Her Majesty’s Government Communications Centre (HMGCC) and leading science and engineering company QinetiQ hosted the latest Cyber …

Cybersecurity

Security as the new innovation enabler

Ian Jenkins, Director, Network & Security -UK&I, VMware discusses in Information Age why we need to re-engineer our fundamental security model and …

Vmware

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful …

Cyber-attacks

Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data …

Online Privacy

Is There a Talent Gap in Cybersecurity?

Current challenges in the cybersecurity industry have less to do with technological limitations and more to do with a shortfall in human capital. …

What Your Organization Needs To Know To Undergo A Secure Digital Transformation

Just about every company today is going through some type of digital transformation, whether migrating entire departments and data centers to the …

SaaS

Can you hack me now?

How identity-based networking can protect your LTE connections from attack.With well over 200,000 cell towers up and running in the United States …

Networking

“Zero Trust” Is the Opposite of Business

The term zero trust has been cropping up a lot recently, with even a small conference on the topic recently. It sounds like an ideal security goal, …

Hackers wage a new Cold War

The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, …

Cold War

Analysis of half-a-billion emails reveals malware-less email attacks are on the rise

FireEye analyzed over half-a-billion emails from 1H 2018, and found that 32% of email traffic seen in the first half of 2018 was considered ‘clean’ …

FireEye

Why Are We Still Talking About the Reporting Line of the CISO?

Why are so many organisations and security professionals still worried about the reporting line of the CISO? This is one of the oldest and most …

Conflicts of Interest

Accept the death of the traditional enterprise network: Your security may depend upon it

Today, the enterprise “network” is mobile and accessed through devices by multiple users, with a lot of the services being used served via the cloud …

Enterprise