You Just Got Pwned – New Threats to Mobile Security

You Just Got Pwned – New Threats to Mobile Security

Mobile devices are now more ubiquitous than PCs. Their popularity and relatively immature security have made them attractive targets for hackers. The number of new vulnerabilities in mobile operating systems and apps continues to grow; as does the number and...
Risks and Rewards – Securing the Internet of Things

Risks and Rewards – Securing the Internet of Things

IoT is transforming industries and creating massive business opportunities. By 2020, the number of IoT connected devices is predicted to exceed 40 billion. From smart televisions to critical infrastructure, our industry needs to protect and manage devices and...
10 Habits of Great CISO’s

10 Habits of Great CISO’s

I’ve had the good fortune to collaborate and work with many truly great CISO’s. Here are some observations of the personal habits that make them great and the attributes that anyone in Cybersecurity can emulate. They make time. No one in IT security has enough...
Anonymous on the banking warpath

Anonymous on the banking warpath

If you’re working in the Banking or Financial sector make sure doors are locked and windows are shut. Anonymous has launched a 30-day attack against “all central banks” and major financial institutions, the activist-hacking group warned this week,...

Banking and Retail public enemy number one

Are you involved in the banking or retail sector? Read on and see why the U.S. financial services and retail sectors had more data breaches in 2015 than any other business sectors worldwide. Despite continued efforts to shore up security to protect payment card data...
Healthcare organizations under attack

Healthcare organizations under attack

Has your healthcare organization been affected by a breached? Whether you know it or not, you probably have been. The 911 call has come in loud and clear for the healthcare industry: nearly 90% of all healthcare organizations suffered at least one data breach in the...