As a child, I played soccer fervently. My father, a German immigrant to the U.S. who was very passionate about the sport, explained to me that there is no game that brings the world closer together.
According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.
The nationwide shortage of cybersecurity professionals – particularly for positions within the federal government – creates risks for national and homeland security, according to a new study from the RAND Corporation.
A systematic approach to developing and updating mobile device management (MDM) and Bring Your Own Device (BYOD) policies is critical to assure data protection in a mobile access environment. After you develop and implement mobile security policies, it is important to evaluate and update policies on a regular basis.
Privacy issues have long been a big concern when it comes to cybersecurity, but with major security breaches like the one Target experienced in December 2013
In the event of a breach, you need to have a written plan to take immediate steps and know who is going to analyze the problem, who will notify the people impacted by the breach, and who you can call for help, among other things.
In early May, the FTC’s Chief Administrative Law Judge held that in an enforcement action the FTC must disclose “what data security standards, if any” it has published and intends to rely upon to demonstrate that a company’s data security practices are not reasonable and appropriate.
Acccording to the 2014 U.S. State of Cybercrime Survey, most U.S. organizations' cybersecurity capabilities do not rival the persistence and technological skills of their cyber adversaries.
An abundance of channels exist today to communicate through online messaging, yet email remains the most mature method to do so and is an integral part of people’s daily activity.