In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other Read more…

Differences in cultural values have led some countries to tackle cyber attacks with increased internet regulation, while others have taken a ‘hands-off’ approach to online security.

Cryptocurrency theft and scams stands at $4.4 billion, the lowest it has been in two years, according to the Cryptocurrency Anti-Money Laundering Report. 

What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO’s communicate the business value of this strategy?

As you advance your security career into senior and executive levels, occassions may arise whereby you find yourself in circumstances where your personal values may conflict with those in the Read more…

While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators Read more…

The Cybersecurity and Infrastructure Security Agency (CISA) issued a draft binding operational directive, BOD 20-01, which will require federal civilian executive branch agencies to publish a vulnerability disclosure policy (VDP).

Northwest local schools in Cincinnati, Ohio were closed for safety training following a recent fatal shooting that prompted a lockdown at a local high school.

Local government agencies are reminding citizens to take necessary precautions to be safe this holiday season, such as “See Something, Say Something,” to report any terrorism-related behavior and to be Read more…

The Internet of Things (IoT) is living up to the hype. There are more than 20 billion end devices already networked through the Internet, with this number increasing more than Read more…

error: Content unreachable !!