The Supply Chain is Only as Strong as its Weakest Link: How You Can Better Defend Against Third-Party Cyberattacks

A particularly unfair aspect of a maturing cybersecurity program is that even as your business ...

Read More

The Cliffs Notes Version to Addressing the Ransomware Threat at Schools

It's back to school time: for teachers, students…and cybercriminals.

Read More

Charlie Discovers Security Testing

You may remember our "Security Testing Practices and Priorities" report, which studied how ...

Read More

A 4-Step Process for Softening the Blow of a Zero-Day Vulnerability

Halloween is almost here, and if you want to bring out the fright in security professionals, ...

Read More

9 Pen Testing Essentials for Making ATMs Less Hackable

Criminals fancy ATMs for the same reason cybercriminals do: convenience. There are some four ...

Read More

How to Eliminate Common Sources of Employee Fraud

While you want to believe all your employees are loyal and trustworthy, many reasons exist for why ...

Read More

Protecting Your Mobile Data: Advice from an Ethical Hacker

Face it: Your employees love their mobile applications. The average person uses 11 apps on their ...

Read More

9 Steps to Slowing and Stopping Your Next Data Breach

Data breaches are such an anxiety inducer because you never know when they're coming, you're often ...

Read More

7 Powerful Pointers to Help Thwart Email-Based Attacks

While alternative options for functional communication channels are steadily growing for business ...

Read More

How Small Retailers Can Take Their Cybersecurity from Zero to 60

A laundry list of major companies of which you've almost certainly been a customer have been ...

Read More

How to Defend Your Industrial Control Systems: 8 Practical Steps

Ask virtually any security expert to name the most nightmarish scenario related to the ...

Read More

What to Do When You‘re Getting Phished but Have No Idea Because It Looks Totally Authentic

A "huge, startlingly fast-moving, and perplexing" phishing attack made its way to an estimated one ...

Read More

The 8 Do’s and Don’ts of Remote Access and Point-of-Sale Systems

Over the years, the point-of-sale (POS) environment has evolved from traditional cash registers and ...

Read More

How to Thrive as a CISO in 2017

The job of a cybersecurity executive is a test in resilience and thoughtfulness. Aside from ...

Read More

10 Ways You and the Board Should Share the Security and Risk Burden

Never mind sophisticated hackers, advanced attacks or naïve employees, one of the most aggravating ...

Read More

How You Can Help Dodge a Web Application Attack

Despite the rise of emerging technologies like cloud and mobile - and the continued advancement of ...

Read More

Why Point-of-Sale Malware Isn’t Going Away – And What You Can Do About It

Many shoppers are now doing as much dipping of their credit and debit cards as they are swiping ...

Read More

14 E-Commerce Cybersecurity Pointers to Survive the Holidays

Before the holiday cheer can arrive, online retailers must face the usual trepidation of ...

Read More

Introducing the Managed Security Services Provider Decision Guide

If you're like me, you hate making decisions. This explains why, for example, I leave the choice to ...

Read More

Did You Forget to Migrate Off Windows Server 2003?

Eighteen percent of businesses are still running Windows Sever 2003, the server operating system ...

Read More

When Your CEO Isn't Your CEO: 4 Ways to Help Avoid the Scam

Business executives have long served as optimal marks for digital con artists. For years, spear ...

Read More

How to Better Secure the Endpoint: 5 Elements of a Successful Strategy

Endpoints are everywhere and, at the same time, nowhere. Whether it is a laptop or desktop ...

Read More

How to Stay on Top of the EU General Data Protection Regulation

New data protection rules in the European Union have now been published after the European ...

Read More

9 Powerful Ways to Help Prepare for a Data Breach

Do you ever have that dream where you're back in college and you've somehow forgotten to attend one ...

Read More

5 Highly Effective Ways for Law Firms to Protect Client Data

Cybercrime is evolving rapidly and targeting all types of businesses. Where once the chief victims ...

Read More

What to Do About Social Engineering and POS attacks in the Hotel Industry

Think about your average hotel lobby on a busy day. Likely there will be numerous comings and ...

Read More

Why Cybersecurity in the Hotel Industry Should be a Joint Effort

Recent cybercrime headlines in the hospitality industry should make for unsettling reading after ...

Read More

How to Stay One Step Ahead of Retail Hackers

They are glorified in Hollywood as unbeatable masterminds, and ubiquitous in real-world headlines ...

Read More