View Post

Cyber Incident Reporting Guidelines: What You Need to Know

In Security by Natalie ValentLeave a Comment

Last summer, the White House took a significant step toward defining and coordinating a national response to the growing number of cyberattacks on government, businesses, and consumers—and it couldn’t have come at a better time. Last July, the Obama Administration released Presidential Policy Directive-41 on U.S. Cyber Incident Coordination Policy, which outlines how the government responds to significant cyber incidents. …

View Post

Predictive Analytics and the Future of Cybersecurity

In Security by Daniel Newman1 Comment

Today, cyberspace operates like a warzone. Attacks are intelligent and measured, the enemy is at your backdoor, and your best guys, your IT team, are on the front lines. If you planned on being Switzerland – neutral and unassuming – it’s time to face reality. Cyberattacks happen to the best of us, with no warning and no way to retaliate …

View Post

Security Heightens as Hackers Target Mobile

In Mobility, Security by Daniel NewmanLeave a Comment

Many enterprises have taken to creating their own proprietary apps and software, and mobile devices are now a mainstay in modern business. Shadow IT isn’t the only concern accompanying the growth of mobile in the business world, however. As mobile technology becomes more popular and pervasive, hackers are turning their attention toward mobile devices. Understand Shadow IT in Modern Business …

Keeping Data Safe in the Cloud is Every IT Team’s Goal

In Cloud by Shelly KramerLeave a Comment

Here’s something that I hear all the time and I’m sure you do as well: “The future of business is cloud technology.” A decade ago, the pundits and prognosticators who uttered these words may have had been considered visionaries, but today, cloud is not only the future, it’s very much the present. As those of us in the tech space …