5 critical steps to creating an effective incident response plan
TAGS: cybersecurity | incident response Cybersecurity professionals around the world work to prevent security incidents that would undermine the confidentiality, integrity or availability of their …Continue reading →
Taking Social Security numbers public could fix our data breach crisis
Earlier this week, we learned that the American Medical Collection Agency, a billing collection agency, suffered a data breach affecting millions …Continue reading →
Fact or Fallacy: Stay Up to Date on Best Practices for Password Security
How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →
Becoming a data security administrator is a great pathway into cybersecurity
In a recent survey of Chief Information Officers, 88 percent reported that cybersecurity initiatives were on their shortlist of priorities for …Continue reading →
Password-Based Attacks Pose New Dangers for Agency Networks
Last year, the United States Computer Emergency Readiness Team (US-CERT) issued an alert that hackers were targeting organizations in the …Continue reading →
Big Tech can’t be trusted. It’s time for regulation
Big Tech is under the spotlight, and for good reason. In the past couple of years, an onslaught of incidents …Continue reading →
Does Your Business Need Unified Endpoint Management?
Consider how many endpoint device types exist in the typical business: Virtually all have desktop and laptop computers, as well …Continue reading →
5 Ways to Safeguard Student Information
Schools handle a wide variety of sensitive information concerning students and their families. Laws, regulations and ethical obligations require administrators …Continue reading →
Nine pitfalls to avoid on your path to certification
Over the past two decades, I’ve helped thousands of people earn cybersecurity certifications through my books, video courses, and online …Continue reading →
Evaluating Intrusion Prevention Systems in Higher Education
Colleges and universities continue to find themselves the targets of large-scale cyberattacks. Some of these come from foreign sources, such …Continue reading →