Cloud Computing Report – Security Violations in Cloud Computing Service Adoption

Learn about identity and access management top category of concern for I/PaaS deployments in organizations plus a look at Amazon Web Services (AWS). Some report highlights include: The most common violation types in public cloud infrastructure (IaaS) like Amazon Web Services What activities security teams are setting DLP policies around across SaaS and IaaS Specific […]

Cybersecurity Risks – Poor password hygiene, HIPAA, Collaboration, Permissions and Shadow IT

Should you be concerned about your clients’ password hygiene? Definitely yes. Poor password hygiene is the easiest gateway for cyber attackers to exploit. All the fancy security software in the world doesn’t matter if your clients are giving away passwords like candy on Halloween. We were curious about just how prevalent terrible password hygiene is […]

Learn How to Survive the Cyber Risks of Cryptocurrencies (Bitcoin and Altcoins)

Cryptocurrencies like bitcoin are today’s hottest investment opportunities. They have made millions of dollars for savvy investors. Yet cryptocurrencies have become the target of widespread theft and scams. They are also central to digital extortion, money laundering and other crimes that can impact you—even if you don’t invest in cryptocurrency. First, cryptocurrencies became the payment […]

Security Breach Report – Examination of Cyberattack by Various Industry Sector

Globally, cyber-crime is expected to cost the world $6 trillion per year by 2021. Over the past few years cyberattacks have left no industry unscathed. Every sector endures challenges when working to prevent, stop, or overcome a cyberattack. Read more in this breach report, which provides an examination of attacks, broken down by sector. You’ll […]

OWASP HTML5 Security Cheat Sheet Guide

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics. This cheat sheet serves as a guide for implementing HTML5 in a secure fashion. Contents Include: Communication […]

Cybersecurity Is Everyone’s Job. Are You A Vulnerability?

Cybersecurity responsibilities can’t fall on security teams alone. But how do other stakeholders—like professionals in HR, sales and legal—contribute to the security posture of your organization? Created by NICE (the National Initiative for Cybersecurity Education, a NIST program), this article outlines what each member of an organization should do based on the types of work […]

How to Prevent 5th Generation Cyber Attacks with Check Point Infinity

The reason cyber security effectiveness seems elusive is because information technology has fragmented into on-premises networks, public and private clouds, SaaS/IaaS, and mobile environments. Protecting this broad threat surface with point solutions leaves cyber security gaps. In addition, 5th generation multi-vector cyber attacks spread faster and inflict more damage. The only way to prevent sophisticated […]

How to Protect Data Center from Cyberattacks – Hidden Costs of Detection-Based Approach for Cloud, Virtualized and Edge Infrastructure

Data centers are truly the life blood of many organizations – whether on-premises or in the cloud –providing access to information and applications that characterise that enterprise. As data centers have become more central and valuable, so too has the job of securing them from cyberattacks. To date, many data centers have followed the familiar […]

Advanced Cyber Security Threats Protect Best Practices Guide

“It’s not a matter of if you will be attacked — it’s when.” There’s good reason that’s an increasingly common battle cry among cyber security professionals: Fresh digital security threats continually emerge from new and unexpected sources. Just consider the sudden spread of viruses like WannaCry and Petya/NotPetya, the expansion of ransomware threats, the growth […]