The Imperva Breach is a Sobering Reminder That Anyone Can Be Compromised
In late August, leading cybersecurity firm Imperva suffered a data breach. It’s certainly not as bad as it could have been, and there’s no doubt the firm will recover quickly. At the same time, it serves to drive home the point that in today’s threat landscape, there’s no such thing as impenetrable.
Want to Profit From Reseller Hosting? Here's How
Reseller hosting can be incredibly lucrative if you know what you’re doing. On the other hand, it can end up being little more than a money sink if you don’t. Here’s how to profit, whether you’re choosing reseller hosting as a value-added service or looking to start your own business with reseller hosting at its center.
What We Can Learn From U.S. Cybersecurity Failures
A congressional report published in late June has revealed what we all feared: The U.S. is failing to adequately protect itself against cyber threats on multiple levels. It’s not all bad news, though. The report provides a framework of how to avoid making the same mistakes.
How to Check if Your System is Vulnerable to the BlueKeep RDP Flaw
At the end of May, it was revealed that someone has been scanning the Internet for Windows systems that are vulnerable to the Bluekeep vulnerability. The infosec community believes it’s the precursor to a much larger attack, and they’re probably right. Here’s how to ensure you aren’t vulnerable to it.
Cloud Ops is the Future: Why You Should Move Your IT Operations to the Cloud
Much has already been written on the capacity of the cloud to make a business more flexible and agile. You’ve read on more than one occasion about how cloud computing can reduce costs and free up your IT department to focus on other things. But how? And more importantly, how can you move your own IT operations into the cloud?
How to Strike a Balance Between Privacy and The Data-Driven Economy
The idea that digital privacy is dead is widespread. That belief hasn’t stopped privacy advocates from pushing for better, more widespread user protections. Nor has it prevented a pushback from marketing agencies and other data-driven organizations. Will there ever be a happy medium between the two?
The Real Danger of AI Is Incompetence, Not The Singularity
The idea of killer robots - of artificial intelligence that one day deems humanity obsolete - is one of the most common tropes in science fiction. And maybe someday, machine overlords will be a real threat. For the time being, however, it’s not artificial intelligence we should fear. It’s human intelligence - or the lack of it.
What Does Taylor Swift Have To Do With Cybersecurity, Exactly?
You wouldn’t exactly expect a celebrity musician to be tuned-in to cybersecurity issues. Many superstars, after all, are notorious for either taking a hands-off approach with stuff outside their sphere or else being woefully misinformed. Taylor Swift is neither - and she might be our best bet for making people outside of IT care about data privacy.
Three Ways You Can Protect Your Business From Phishing Attacks
Phishing emails remain one of the most common methods by which cybercriminals target both enterprises and individuals. And why shouldn’t they be? Even though it’s a simple tactic, it works extremely well - all it takes is one weak link, and your network’s compromised. What can you even do to defend against something like that? Quite a bit, actually.
AI-Driven Cybersecurity Isn't The Holy Grail You Think It is
Machine learning and artificial intelligence both carry a lot of promise where security is concerned. Much has already been written about how they’ll completely change the way we protect our systems and data against attack. This hype, however, should be taken with a grain of salt. AI isn’t the be-all and end-all of cybersecurity - not yet, at least.
Having Trouble Finding Development Talent? Take A Look At Your Job Listings
You already know there’s a talent shortage in IT. Maybe you have a plan for addressing it. Maybe you don’t. Either way, if you’re having trouble filling a position at your company, it might be time to rethink your recruitment process. The first step is to take a look at your job postings - how bad are they?