November 14, 2019 | Todd Waskelis

Cybersecurity: top of mind Q and A

I really enjoy Shira Rubinoff's videos, and captured one of them in case you prefer reading to watching videos. Please find snippets of this commentary in the AT&T Cybersecurity video series with Shira Rubinoff interviewing me recently. Episode #6 - @attcyber Video Series With @twaskelis AVP @attcyber Discuscussing:Issues we are facing in #CyberSecurity today Full video��https:/…

November 13, 2019 | Sam Bocetta

The future job market for cybersecurity professionals

If you work in IT – and even if you don’t – you’re probably aware of the huge shortage of cybersecurity professionals. Most companies are desperate for analysts trained to protect their valuable data from theft. On the surface, then, the future of the job market for cybersecurity seems bright. Look a little deeper, though, and…

Get the latest security news in your inbox.

Subscribe via Email

November 12, 2019 | Bob Covello

Can Google now guess your password in under 4 minutes?

In a recent story that appeared on multiple news sites, as well as the Google AI Blog, it was announced that Google has achieved “Quantum Supremacy” with its 54-Qubit processor, named “Sycamore”.  This is a monumental leap forward in computing capabilities.  (Yes, I had to resist calling it a quantum leap forward, because that…

November 11, 2019 | Theresa Lanowitz

AT&T Cybersecurity Insights™ Report: Security at the Speed of 5G

While some enterprises appear to be getting an early jump on the security implications of 5G, many are struggling with the implications to the business and the changing security model.  This is based on a survey AT&T Cybersecurity conducted with 451 Research of 704 cybersecurity professionals in North America, India, Australia and UK in August - September 2019. Participating organizations…

October 31, 2019 | Mjellma Gonzalez

Data breach: how to prevent it

We are living in the era of the digital economy where companies are collecting and storing lots of valuable customer data on a daily basis. As it has turned out, data is an important input in the competitiveness, growth, and revenue generation for any company across industries. But every valuable resource has its vulnerabilities, and data is not left out…

October 30, 2019 | Karoline Gore

Physical threats to Cybersecurity that you must address

Photo by Nahel Abdul Hadi on Unsplash Over 90% of data breach is attributed to human error costing a company anywhere from $1.25 million to $8.19 million. Tackling cybersecurity does not only entail non-physical risks, but also includes an assessment of physical threats such as human, internal, and external hazards. Only then can an appropriate and effective security …

October 29, 2019 | Bob Covello

Was the largest breach in history a misconfiguration problem?

Earlier this week, I heard a fascinating interview with the former Chief Information Officer of Equifax, Graeme Payne.  If you are unfamiliar with Graeme, he was the scapegoat for the Equifax breach; described in Congressional testimony as “the human error” that caused the breach.  Graeme, however, is a true gentleman who is very gracious about his…

October 28, 2019 | Kyle Chrzanowski

Lessons learned conducting an information security risk assessment 

In an age where businesses are relying more than ever on the rapid advancements in technology to drive innovation, strategy, growth and competitive advantage, it is clear the prevalence of technology is not slowing down. But the increase in new devices and systems that utilize connectivity, as well as the transition to the network of devices and systems that were…

October 23, 2019 | Carisa Brockman

Data Governance….at the heart of security, privacy, and risk

Security, privacy, and risk does not have to be scary… but with GDPR, CCPA, and organizations moving to a risk-based approach to security rather than focusing on only compliance, it has become a daunting challenge.  What is typically at the heart of organizations?  Data and information.  The common denominator that makes security, privacy and risk more…

October 21, 2019 | Kim Crawley

Reviewing best practices for IT asset management in the cloud

It used to be that businesses needing their own large computer networks had to do everything themselves. They had to buy all of their servers, all of their networking appliances. They needed the physical space on premises for all of their datacenters, the HVAC people to keep everything cool, and the massive electricity bills to keep all of that going. …

October 17, 2019 | Mjellma Gonzalez

The risks of public Wi-Fi and how to stay safe

Photo by laura kelly on Unsplash In a bid to entertain their customers, airports, coffee shops, shopping malls - and literally all public places- provide free Wi-Fi. And because the traffic in and around these places is exceedingly high, their Wi-Fi networks aren’t as secure as you’d imagine. For what it is worth,…

October 16, 2019 | Devin Morrissey

Are smart homes really safe from hackers?

Image Source: Pexels There are a number of smart devices becoming commonplace in homes around the world, leading us closer and closer to the reality of smart homes, or houses that depend primarily on interconnected smart tech. Heating, lighting, and common appliances like doorbells, alarms, and entertainment devices are now increasingly being designed to operate on the internet of things …

Watch a Demo ›
Get Price Free Trial