Olympian, Navy Seal and Silicon Valley Investor Lessons Learned

Honor, courage and commitment were the soft skills provided to him from the military. But the culture creates the understanding that “you’re not supposed to even acknowledge what you do.”  Read More

Ransomware Gangs Don’t Need PR Help

We’ve seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than the say-so of the ransomware gangs themselves. Such coverage is potentially quite harmful and plays deftly into the hands of organized…

Becrypt extends secure device as a service offering, combining full device life-cycle management, with government-accredited security

Becrypt enables organisations to reduce the burden on in-house IT resources, while scaling remote working and the secure use of cloud services. London, 2 July 2020 – Working with leading hardware manufacturers, Becrypt’s Paradox Edge Device as a Service (DaaS) solution now provides accredited endpoint security throughout the entire device…

How to protect your organization from coronavirus-related phishing attacks

Emails exploiting COVID-19 have risen, declined, and risen again along with the changes in the pandemic and the shift to remote working, according to the security company GreatHorn. Read More

Keep the lights on: Three things power companies need to do to harden cybersecurity defenses

IoT device makers and the US government need to collaborate with the industry to make sure digital transformation closes security gaps instead of opening new ones. Read More

The next cybersecurity headache: Employees know the rules but just don’t care

Employees are still ignoring cyber security best practice despite being more aware of the risks. Read More

CISO Perspectives: Zero Trust, Secure Access, and What’s Next

Workloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organizations now have plans to continue at least some form of remote work longer term. Endpoint threat v… Read More

How to use the Google Pixel Safety Check feature

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user’s personal safety. Learn how to use the Safety Check feature. Read More

Top 5 Key Takeaways From Cyber Security Hub In June

The Cyber Security Hub community has safely made it’s way into July. As cyber security is a moving target, we take the opportunity to share perspective on where our collective sites were most recently… Read More

COVID-19 has spurred businesses to migrate security operations to the cloud

Companies have increased their reliance on cloud-based security platforms to protect sensitive data as a result of the coronavirus pandemic, according to a new survey. Read More