cybersecurity
Speedcast offers Cloud-based Solution to detect Cyber Threats on Maritime
Speedcast, an Australian company which offers Communications Satellite Technology has launched a cloud-based solution to thwart cyber attacks on vessels and other Maritime services. The Speedcast’s Cybersecurity as a Service solution is capable to defend maritime assets, detects and monitors threats and helps mitigate the risks of all cyber threat variants. Cybersecurity as a service […]
CYBERSECURITY SCHOLARSHIPS FROM (ISC)² AND THE CENTER FOR CYBER SAFETY AND EDUCATION
This post was originally published here by (ISC)² Management. Each year, (ISC)² and the Center for Cyber Safety and Education partner together to offer scholarships to students around the world. There are three categories of scholarships in this program: Graduate, Undergraduate and Women’s. All are open to students pursuing cybersecurity degrees in any country in […]
Creating a Culture of Cybersecurity
This post was originally published here by gregg rodriguez. Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you share on social media. By 2020 the […]
Creating a Culture of Cybersecurity
This post was originally published here by gregg rodriguez. Creating a culture of cybersecurity has become more critical than ever. Why? Consumers and businesses have become extremely dependent on data. Everything we do online generates data, from your searches to what you save to the cloud to what you share on social media. By 2020 the […]
LIVE FROM #ISC2CONGRESS: BLOCKCHAIN – THE FUTURE OF CYBERSECURITY?
This post was originally published here by (ISC)² Management. The future of cybersecurity was the subject of lively discussion during a session on blockchain’s potential to revolutionize how data is protected. The session was part of the 2018 (ISC)2 Security Congress, taking place this week in New Orleans. The Blockchain session’s presenters, Nitin Uttreja and Ashish Dwivedi, […]
CloudPassage a Cybersecurity Distinguished Vendor
This post was originally published here by jeff baumgarten. This has been the year of cybersecurity, or one of data breaches. Depending on where you stand. In any case, it’s been a busy year for the cybersecurity industry and for companies trying to lock down their cloud security strategies. With digital transformation in the air, more […]
Why CMOs Should Care About Cybersecurity
This post was originally published here by jeff baumgarten. Everyone from Deloitte to Ad Age to Forbes and many more are talking about why CMOs should care about cybersecurity and become more involved in the overall strategy. That makes sense as security moves beyond the purview of IT and becomes more of a board-level issue. Having seen cybersecurity from publicly-traded company […]
THE IMPORTANCE OF A STRONG CYBERSECURITY CULTURE
This post was originally published here by (ISC)² Management. It may seem obvious: A strong commitment to cybersecurity from an organization’s top management equals better protection. The cybersecurity staff have more confidence and focus on the right things – fighting threats as opposed to worrying about who will leave next for greener pastures. These were […]
Considering a merger then keep your firm free from Cyber Threats
Security breaches are becoming common these days. But if you are planning for a merger, then you better keep your company away from such menace. Want to know why? In general, the process of combining two companies creates vulnerability because when the IT footprint increases some security lapses do creep in and when they are […]
Top 5 Security events of 2018
The first half of 2018 was hit with some notable security events just days into the new year. And, unfortunately, these vulnerabilities are just getting started and are expected to get stronger and pose an even bigger threat. Here are the top five threats that we’ve seen in the first half of 2018: 1. Meltdown […]