How do we maintain security when we're connected to so many insecure devices and apps?Continue reading
Barracuda
IT Security Spending Increases to Confront Advanced Threat Realities
While there’s no absolute correlation between the amount of money allocated and the level of...Continue reading
Ransomware – an Ounce of Prevention and a Dollop of Cure
Taking human hostages and exchanging them for money is a messy and very risky business....Continue reading
Recognizing and combating cybercrime – NCSAM Week 3
Can you protect yourself from the different types of cybercrime attacks? This post can help. Continue reading
Cyberwarfare Moves Out of the Shadows
An intense but largely unseen cyberespionage contest between various nation states is finally starting to...Continue reading
NCSAM Week 2 – Creating a culture of cybersecurity
In the digital age, maintaining safe and secure access to connected resources can be critical.Continue reading
Cybersecurity awareness versus IT security fatigue
IT administrators are subjected to thousands of alerts each week, most without context or prioritization.Continue reading
Application Security News for September 2016
Google Chrome to explicitly identify sites that do not use HTTPS Google has been at...Continue reading