Big hacks over the past couple years have led many organizations to purchase cyber insurance as a means to protect their data. Is cyber insurance adequately prepared to meet the growing demands of Internet risks?
Browsers might deprecate trust for SHA-1 Certificates sooner than initially announced. Switch to SHA-2 now.
A typical home has around five devices connected to the local network which aren’t computers, tablets, or mobile phones, and all of them can be vulnerable to attack.
Insider threats in the US cost $230, which is more than breaches caused by system glitches ($142) and human error ($134).
The benefits of using a trusted Certificate Authority for the security of your company far outweigh the potential loss of securing it yourself.
Almost 60% of IT pros say their companies don’t invest enough in security.
BYOD is no longer hypothetical. Enterprises must adapt to defend against security threats.
Research findings do not directly undermine the security of the Internet at large. Given the lessons learned with the MD5 full break, it is not advisable to wait until these become practically possible.
Keeping with the weekly theme for National Cyber Security Awareness Month of “Creating a Culture of Cyber Security at Work,” we wanted to highlight the importance of employee education.