Would You Hire a Vendor Who Tracks Mud in Your Home? We’ve all been there before: you need a plumber. You hope that any plumber that you invite into your home respects your space. If they end up tracking mud through your house, or they leave your home in a worse condition, chances are you… Read More
Honeypot Security: Identifying Active Hackers Through Honeypot Deception
Every security expert has a perspective on what (and who) poses the biggest network security threats: cybercriminals, lone hackers, hacktivists, insiders, compromised workstations, and even nation-states. But with so many traffic requests making their way to your corporate network, it can be hard to distinguish attackers from legitimate visitors. While security information and event management… Read More
How to Address the Cyber Security Hiring Gap: Tips from an HR Executive
Cyber Security Talent Shortage: How We Got Here While the cyber security industry is growing significantly faster than other markets, the challenge to fill more than 500,000 open computing cyber security positions is a serious issue spanning business as well as federal, state, and local government. Many colleges and universities saw the worker shortage coming years ago, and in… Read More
2016 ISSA International Conference Recap: People Drive Cyber Security Strategy
The 2016 ISSA International Conference concluded last week in Dallas. This year’s two-day conference, themed, “Survival Strategies in a Cyber World,” featured two keynotes, a variety of breakout sessions, and compelling panel discussions from a wide range of thought leaders in the cyber security space.
[Infographic] State of Cybercrime 2016
Recognizing and Combating Cybercrime – National Cyber Security Awareness Month (NCSAM) wrapped up last week, and the Week 3 theme focused on “Recognizing and Combating Cybercrime.” The National Cyber Security Alliance …
FTC Expanding its Role in HIPAA Enforcement Actions
In new joint guidance released from the Federal Trade Commission (FTC) and U.S. Department of Health and Human Services Office for Civil Rights (OCR), HIPAA covered entities and business associates are reminded that they are subject to enforcement of both HIPAA regulations and deceptive business practices under the FTC Act. A covered entity or business… Read More