Joshua Morales: Last month a catastrophic data breach happened to the leading law firm in the offshore market, Appleby. The data breach included roughly 13.4 million leaked documents from the years 1950 to 2016. Among the files were loan agreements, Continue reading Appleby’s Paradise Papers Breach: Is Your Firm Next?
Corine Mbiaketcha Nana: "Beware of the robots! No office job is safe" – or so reads the headline of yet another article about why emerging technologies spell doom for today’s worker. While using such phrases to describe artificial intelligence (AI) Continue reading Technology In The Workplace: Cause For Panic Or Technology Goldmine?
Jamshed Avari: Security research firm Positive Technologies has said it will demonstrate an exploit that allows the running of arbitrary unsigned code on any PC with an Intel 6th Gen ‘Skylake’ Core CPU or later. The security hole exists because Continue reading Intel Management Engine Vulnerability Exposes Millions of PCs to Undetectable Attacks, Claims Security Firm
Extortion-based cyber attacksToday, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has been predicted that cyberattacks are going to get even worse. Recent Continue reading Extortion-Based Cyber Attacks: The Next Evolution In Profit-Motivated Attack Strategies
Asha McLean: A report from the security firm has highlighted a need for ‘SecOps’, where DevOps and security teams work alongside when building out applications. Due to the dynamic nature of DevOps and the business "secrets" they have access to, Continue reading DevOps The Forgotten Team When It Comes To Security: CyberArk
Adarsh Verma: From time to time, the security researchers continue to make us realize that Windows operating system is full of loopholes that can be exploited by hackers to steal our data. One such vulnerability was patched by Redmond in Continue reading Your Windows Login Details Can Be Stolen By Hackers Without User Interaction
Mark Duell: North Korea has been publicly blamed by the UK’s Security Minister for the WannaCry cyber attack which hit the NHS. Home Office Minister Ben Wallace said the Government believed ‘quite strongly’ that a foreign state was behind the Continue reading Attack Could Have Been Prevented If ‘Basic IT Security’ Measures Had Been Taken
Brett Hagler: The No. 1 lesson I’ve learned as the CEO of New Story is that our ability to impact the most people does not have to be a function of how much we can fundraise. I used to think Continue reading How Organizations Can Achieve A Bigger Impact With An Open-Sourced Pursuit
James Woods, Neil Jones: A key theme of the recent Cybersecurity Nexus event in Washington, D.C. was the growing need for small and medium-sized businesses (SMBs) to adopt enterprise-like IT security best practices. In fact, SMBs might actually have an Continue reading Five Key IT Security Best Practices to Safeguard Your Expanding Business
Jason Miller: The U.S. Patent and Trademark Office has been out in front of most agencies in modernizing its technology systems. By implementing a dev/ops process, it can now turn around software bug fixes in 24-to-48 hours. USPTO also is Continue reading For USPTO, Security Is Part Of The Software Code