Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals.  Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities

What Does Your Employer Know About Your Daily Activities How much does your employer know about your personal life? Maybe more than you realize. When you use your personal devices to access company servers they can log your activities. Then they can track when you log...

Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...