Cover Your Assets: Cybersecurity and Social Engineering

Cover Your Assets: Cybersecurity and Social Engineering

Social engineering is any activity in which cybercriminals trick or manipulate victims into willingly revealing sensitive information. It’s a particularly diabolical exploit of human weakness. Human beings have a charming, and frequently catastrophic, tendency to...
Cybersecurity Threats: Old, New, and What to Do

Cybersecurity Threats: Old, New, and What to Do

In July, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) — in cooperation with its UK and Australian counterparts and the FBI — released its latest report on the most routinely exploited cyber vulnerabilities. Of the common vulnerabilities and...
You’ve Been Hacked — Now What?

You’ve Been Hacked — Now What?

A data breach is an organization’s worst nightmare. The financial consequences are hard-hitting and difficult to recover from, damage to a company’s reputation is potentially devastating, and legal action may result from clients whose sensitive data was compromised by...
Targeting the Cloud: Cybercrime’s Next Big Exploit

Targeting the Cloud: Cybercrime’s Next Big Exploit

If there is one thing everyone knows about cybersecurity, it’s this: The cloud is secure. But as with everything in technology, what everyone knows is changing yet again. Bad actors — both rogue and state-sponsored — have aimed their recent attacks at what has...
Overcoming a Cybersecurity Talent Crunch

Overcoming a Cybersecurity Talent Crunch

Are you a small business owner? Or maybe the CEO of a multinational corporation? Either way, you’re about to run into a serious security conundrum. Cybercrime is on the rise, and the talent to prevent it is in short supply. Cybersecurity Ventures predicted a record...