WPA3 Announced After Severe WPA2 KRACK Flaw

Months after the WPA2 KRACK flaw was found, the Wi-Fi Alliance announced its long-awaited new security protocol – Wi-Fi Protected Access 3 (WPA3).
Read More

A Quick NIST Cybersecurity Framework Summary

The National Institute of Standards and Framework’s Cybersecurity Framework (CSF) was published in February 2014 in response to Presidential Executive Order 13636, “Improving ...
Read More

Top 5 cybersecurity questions for the CISO in 2018

CISOs face many challenges as they plan for 2018. These five cybersecurity questions will help guide strategic discussions in a demanding year ahead.
Read More

Critical Vulnerabilities: Meltdown and Spectre

Meltdown and Spectre are critical vulnerabilities in modern processors. These processor vulnerabilities allow programs to steal data that is processed on the computer.
Read More

Why global data privacy will be a top concern in 2018

Data privacy is now a top concern across the world. The National Cyber Security Alliance (NCSA) in the United States leads ‘Data Privacy Day’ which is a dedicated international ...
Read More

The Top Cybersecurity Threats That Your Business Needs to Mitigate

Businesses now face a multitude of cybersecurity threats, and cyber threats are one of the riskiest for the organization. Market analysts from Juniper Research suggest that ...
Read More

10 Step Patch Management Process Template

Patching can be a big challenge when you have hundreds maybe even thousands of IT assets to manage. With information security initiatives, it helps when you have a documented ...
Read More

The Last Hacker: Use These Jedi Mind Tricks in Information Security

The Dark Side sways hackers more than ever, but it doesn’t mean you can’t tap into your Force abilities to put a stop to their attacks. According to Wookieepedia, the Jedi mind ...
Read More