Apr 27, 2020 | Asset Management, Backup, Business, Business Email Compromise, CEO, Compliance, Computers, Corporate Reputation, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Cybersecurity Professional, Data Assets, Data Loss, Data Storage, Disaster Recovery, Employees, Employment, Employment, Executives, Firewalls, Hacking, Hard Disks, Hiring, Incident Response, Intellectual Property Theft, Intricate Data Systems, IT Professional, Laptops, Legacy Systems, Managed Security Services Provider (MSSP), Networking, Patching, Ransomware, Routers, Security, Security Alerts, Shadow-IT, Software As A Service, Technology, Technology, Third - Party, Updates, VPN
Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Apr 25, 2020 | Apple, Big Tech, Biological Viruses, Business, China, Coronavirus, Covid-19, Covid-19, Cybercrime, Economic Disruption, Global Supply Chain, Government Control, Hacking, Intellectual Property Theft, Internet, Nationstates, Pandemic, Quarantine, Quarantine, Radio Show, Radio_Show, Security, Technology, Technology, third-world, Unfair Trade Practices
Can America Compete? US iPhone vs Chinese iPhone We should be manufacturing the products we use in America. American companies can compete with China and it actually would not be that much more expensive. For years we have heard about the Global supply chain but when...
Apr 4, 2020 | Anti-Virus, Applications, Attack Vectors, Audit Logs, Business, Cloud, Compliance, compromised machines, Critical data, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Firewalls, Hackers, Hacking, Hacking, Incident Response, industrial espionage, Intellectual Property Theft, Internet, Legacy Systems, Malware, Monitoring, Nationstates, Networking, Organized Crime, Patching, Phishing, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Routers, Security, Security Alerts, Smishing, Surveillance, Technology, Technology, trojans, Updates, Vishing, VPN
How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Mar 21, 2020 | Backup, Business, Compliance, Computers, Corporate Reputation, credentials, Critical data, Cyber Liability, cyberattacks, Data Loss, Data Storage, Employees, Firewalls, Government, Intellectual Property Theft, Internet, Malware, Networking, News, Patching, Quarantine, Radio Show, Radio_Show, Remote-Work, Routers, Security, Security Alerts, Technology, Unsecured Devices, Updates, VPN
Your Employer Says Go Home and Work — Now what? For many companies and their employees, this widespread hysteria over this coronavirus pandemic has taken everyone by surprise. Remote work might have been a consideration but now is not an option but a...
Mar 7, 2020 | Access Controls, Asset Management, Best Practices, Business, Compliance, credential stealing, credentials, Critical data, Cyber Liability, cyberattacks, Data Assets, Employees, Hacking, Human Element, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Legacy Systems, Operating Systems, Patching, Policies and Procedures, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, Third - Party, Updates
Cryptocurrencies and Insurance Increases Ransomware Profitability Ransomware is rising like a phoenix from the ashes again. Companies are paying enormous ransoms in cryptocurrencies and insurance companies paying out claims, which in turn is adding to the rise in...
Mar 7, 2020 | Artificial Intelligence, Asset Management, Attack Vectors, Best Practices, Biometrics, Business, CEO, Clearview AI, credential stealing, Critical data, Cybercrime, Cybersecurity, Data, Data Assets, data sharing, Data Storage, Databases, Executives, Facial Recognition, Facial Recognition, Hackers, Hacking, Hacking, Hacks, Images, industrial espionage, Information Technology, Intellectual Property Theft, Internet, Nationstates, Online, Organized Crime, Patches, Patching, Patents, Photo Database, Privacy, Radio Show, Radio_Show, Security, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, third-world, Updates, Updates
Hackers Target Large Databases It was only a matter of time! The tiny start-up Clearview AI developed an algorithm that utilized a three billion image database that could end your ability to walk down the street anonymously. They provided it to worldwide law...
Page 1 of 5123...5...»Last »