• Post Quantum Computing Survey Results – Are you ready?

    Post Quantum Computing Survey Results – Are you ready?

    Quantum Computing (QC) is here, it’s not quite mainstream yet but will be soon. When it does become mainstream, the cryptography approaches we use to secure our systems, our networks, and our data will be compromised.  In 2019, DigiCert, the world’s leading provider of TLS/SSL and other digital certificates for websites, enterprise applications, and IoT,
    Read More…

  • 5 Ways to Protect Your Business Against Cybercrime

    5 Ways to Protect Your Business Against Cybercrime

    Cybercrime is on the rise. Even without diving into research and statistics, we know this to be true. Barely a day goes by without some cybersecurity incident affecting business or government stealing the headlines – so when we do take a look at the figures, we should be neither shocked nor surprised to observe the
    Read More…

  • How AI Is Changing the Cybersecurity Landscape

    How AI Is Changing the Cybersecurity Landscape

    Artificial intelligence (AI) is proving to be one of the most influential and game-changing technology advancements in the business world. As more and more enterprises go digital, companies all over the globe are constantly engineering new ways to implement AI-based functions into practically every platform and software tool at their disposal. As a natural consequence,
    Read More…

  • 5 Qualities of a Great CISO

    5 Qualities of a Great CISO

    Today, cybersecurity is a massive concern for businesses of all stripes and sizes. Yet, despite 95% of chief information officers (CIOs) expecting cyber-threats to increase over the next three years, only 65% of their organizations have a dedicated cybersecurity expert or chief information security officer (CISO), according to a survey from Gartner, Inc. This is
    Read More…

  • 3 Robocall Scam Tactics to Watch Out For in 2019

    3 Robocall Scam Tactics to Watch Out For in 2019

    Find out what tactics robocallers are using to steal your personal information and recorded voice authorizations, and get tips to help you avoid being scammed by them. Robocalls are an annoyance and a threat that is increasingly taking over Americans’ phones. A robocall is an automated phone call with a pre-recorded message. While these types
    Read More…

  • 5 Top IT Security Bloggers to Follow in 2019

    5 Top IT Security Bloggers to Follow in 2019

    IT security is a fluid, ever-changing beast, constantly changing and always evolving. New threats are emerging on an almost daily basis – as are new methods and new tools to counter them and protect your business’s data. As such, it’s imperative for IT professionals to stay perpetually in-the-know when it comes to all matters regarding
    Read More…

  • Venafi: Bringing Identity and Access Management (IAM) to Machines

    Venafi: Bringing Identity and Access Management (IAM) to Machines

    Identity and access management, or IAM, has been a focus of cyber security experts and solution vendors for years. However, that focus has been almost exclusively on IT users. Now, with new funding, a vendor focused on bringing IAM principles to machines will soon expand its efforts and market presence. On November 29, machine identity
    Read More…

  • Understanding the Active Cyber Defense Certainty Act – Should Companies Be Allowed to “Hack Back”?

    Understanding the Active Cyber Defense Certainty Act – Should Companies Be Allowed to “Hack Back”?

    Question: Should companies and computer users in the US be able to strike back actively against hackers? Until very recently, to do so would have been a risky strategy in legal terms. The Computer Fraud and Abuse Act (CFAA) of 1986 specifically prohibits individuals form taking retaliatory or defensive actions against cybercriminals, aside from standard
    Read More…