Search Results for: Critical security risks Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Blog Post EU Commission Recommends Using Encrypted Messaging App, Signal March 2, 2020 In consideration of stronger cybersecurity, the European Commission has announced early this month that it is instituting an encrypted messaging... Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Blog Post DHS Issues Hacking Security Alert as Small Planes Found Vulnerable July 30, 2019 DHS Issues Hacking Security Alert for ‘Exploitable’ Network Systems in Small Planes. An attacker with physical access to the aircraft... Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at... Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions.... Blog Post New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department... Blog Post Federal Government Commits Nearly $2 Billion to National Infrastructure Cybersecurity September 29, 2021 In a rare move, the US Senate recently passed the Bipartisan Infrastructure Investment and Jobs Act that included a clause... Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find... Blog Post How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Blog Post EU Commission Recommends Using Encrypted Messaging App, Signal March 2, 2020 In consideration of stronger cybersecurity, the European Commission has announced early this month that it is instituting an encrypted messaging...
Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Blog Post DHS Issues Hacking Security Alert as Small Planes Found Vulnerable July 30, 2019 DHS Issues Hacking Security Alert for ‘Exploitable’ Network Systems in Small Planes. An attacker with physical access to the aircraft...
Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
Blog Post US Government Looking to Fill Cybersecurity Jobs December 27, 2021 Recently, the US Department of Homeland Security announced a new recruitment system, the Cybersecurity Talent Management System (CTMS), aimed at...
Blog Post The Alarming Growth of Cybersecurity Threats That Leave All Sectors Vulnerable December 16, 2021 The rise of the internet has encouraged companies’ rapid adoption of technology. That results in the simplification of online transactions....
Blog Post New project StopRansomware August 23, 2021 In response to the massively increasing number of ransomware attacks, The U.S. Department of Justice (DOJ) and the U.S. Department...
Blog Post Federal Government Commits Nearly $2 Billion to National Infrastructure Cybersecurity September 29, 2021 In a rare move, the US Senate recently passed the Bipartisan Infrastructure Investment and Jobs Act that included a clause...
Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find...
Blog Post How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...