Security

News, trends and insights for cybersecurity in the digital age

2020 Tech Trend: Self-sovereign identity makes data shared in an ecosystem more valuable

As organizations focus on data-driven business models to remain competitive, they will increasingly seek to collaborate with partners and exchange data. Data shared in an ecosystem is more valuable than data locked in a silo because it leads to new innovations and customer experiences. This trend is playing out in many industries including transportation, logistics, […]

Staffers gone bad or bad decisions — which should you worry about more?

rock scale overlooking water

Insider threats have been in the news quite a bit recently, but insider threats don’t always present themselves as a staffer who has gone bad and is stealing and selling secrets to competitors or other nations. While that does happen, a good portion of the insider threat manifests in insiders who make bad decisions with how […]

Why a zero trust security model makes sense in healthcare

by Rikin Patel There has been a long-held assumption that data security threats originate from nefarious external forces seeking to steal an organization’s most sensitive data. Traditional security models were therefore designed with this view in mind and on the mistaken belief that everything within the internal network is trustworthy. But there is evidence that […]

The high risk of data loss associated with employees

company data on employee laptop

The security threat from insiders is growing. Consider the most recent Verizon Data Breach Investigation Report (DBIR), which found that 20% of cybersecurity incidents and 15% of data breaches investigated within the Verizon DBIR originated from people within the organization. According to Verizon’s DBIR analysis, the top motivators behind insider attacks were financial gain (48%) […]

Three key ways continuous delivery improves your security posture

traffic at night

Continuous delivery yields a host of IT and operational benefits, including proven competitive advantages like faster deployment times, responses to customer feedback, and bug fixes.  But one aspect that tends not to make it on the marquee list of benefits — and should probably be headlining it — is security. It’s really quite simple — […]

How mesh networking ensures uninterrupted data exchange between connected devices

One of the major challenges with connected devices is having a reliable network. Cell phone and standard Wi-Fi networks do not guarantee communication everywhere. Even dense urban  areas have numerous “dead” cellular zones in building basements, elevators, tunnels and underpasses. Remote areas like crop fields, mines, oceans and space also pose problems. With this in […]

Ransomware attacks show no signs of slowing

ransomware-on-keyboard

Ransomware attacks are showing no signs of letting up. In fact, recent research shows how these attacks are flourishing. The findings are based on more than 230,000 ransomware attack submissions, between April 1 and September 30, 2019, to antivirus firm Emsisoft and ransomware information site ID Ransomware. ID Ransomware is a site that enables anyone […]

Survey: There’s a divide between cyber security concerns and cyber security actions

cyber-security-divide-visualization

When it comes to cyber security, U.S. businesses and citizens alike have plenty of concerns, but they may not know how to mitigate them. That observation is based on the third annual Cyber Report from property and casualty insurer Chubb (pdf), which found that eight in 10 Americans continue to be concerned about a cyber […]

Cybersecurity jobs are getting more complicated (and harder to fill)

cyber-security-professionals-complex-problem

Ever since networks began connecting enterprise computer systems, organizations have needed workers who understood cybersecurity. Indeed, people with network and systems security expertise usually have been well-paid and in high demand. As far as technology career paths go, security is one of the best. But as with any technology-related position in the digital era, change […]

Targeting the vulnerable: Cyberattacks on healthcare IoT devices

healthcare-IoT

Connected devices are revolutionizing healthcare, allowing providers to examine patients remotely, to gather vital-sign data through wearables in real time, and to advance medical research by collectively generating massive data sets. Unfortunately, the healthcare industry’s embrace of the Internet of Things (IoT) has made it a main target of cybercriminals. In a recent global survey […]