Sunday, May 27, 2018

5 ways deception tech is disrupting cybersecurity

Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered from all corners of the security stack – from the firewall, endpoints, and servers, from intrusion detection systems and other security solutions.

What’s more is that security teams do not have enough people or hours in a day to analyze the alerts that are coming in, and most ‘security events’ don’t even imply an attack in progress. They often are simply sharing information (failed connections, for example) or are what we call ‘false positives’ (when a solution thinks it has found a specific vulnerability, but in fact, it hasn’t.)

5 ways deception tech is disrupting cybersecurity

Sunday, May 20, 2018

How AI and machine learning are redefining cybersecurity

We are now a connected global community where many digital natives cannot remember a time before the iPhone. The rise of smart homes means that we are increasingly attaching our lighting, door locks, cameras, thermostats, and even toasters to our home networks. Managing our home automation through mobile apps or our voice illustrates how far we have evolved over the last few years.

However, in our quest for the cool and convenient, many have not stopped to consider their cybersecurity responsibilities. The device with the weakest security could allow hackers to exploit vulnerabilities on our network and access our home. But this is just the tip of the proverbial iceberg.

How AI and machine learning are redefining cybersecurity

Saturday, May 12, 2018

Cybersecurity Training and Certifications

Cyber-criminals and hackers are in the headlines almost every week. They can ruin a company's reputation and destroy the business. And the threat is increasing rapidly. This is why cybersecurity is becoming one of the world’s fastest growing business components.

But to be truly effective, cybersecurity shouldn't be just an application that comes in a box. It also must include expert teams of highly trained and qualified professionals who know how to secure every facet of the organization.

Image result for CISCO Cybersecurity Training and Certifications

Saturday, May 5, 2018

Top Cybersecurity Threats Active in the Education Sector Today – and Why You Should Care

Educational institution networks continue to be a favorite playground for cybercriminals. Because of the age and interests of the majority of educational users, these networks tend to incorporate cutting edge technologies and strategies. And at the same time, those students also tend to push hard against network restrictions, looking for workarounds to access data and applications that IT administrators may have restricted. To do that, a disproportionate number of users begin cutting their teeth on things like hacking.

istock 611189966

HSE finds recruiting cyber security staff 'difficult'

The Health Service Executive has said it is "especially difficult" to recruit cyber security staff right now because of the compet...