3 Ways to Measure the Effectiveness of Your Cybersecurity Program

    3 Ways to Measure the Effectiveness of Your Cybersecurity Program

    No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...

    2020 Cybersecurity Predictions

    2020 Cybersecurity Predictions

    Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...

    Advanced Persistent Threats | Know Them & Stop Them

    Advanced Persistent Threats | Know Them & Stop Them

    Advanced persistent threat (APT) attackers are the top attackers of the cyber chain. Sounds scary, right? What’s worse is that these groups can steal your organization’s data and navigate its network without ever being noticed. APT is a broad term used to describe an...

    Pen Testing: Dead in 2009 [CSO Online]

    Pen Testing: Dead in 2009 [CSO Online]

    from CSO Online Does pen testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end of pen tests as we know them. His theory is being met with resistance. ... Naturally, security practitioners who swear by pen...