Browsing Category
News
Attains Skyhigh Security Status of AWS Security Competency
Today, Skyhigh Security announced that company has attained the level of Infrastructure Security category Amazon!-->…
In Support of Cybersecurity Maturity-Based Approaches
The McKinsey article "The risk-based approach to cybersecurity" caught my attention and is worth discussing. The!-->…
US DoD and Huawei Representatives Swat at Cybersecurity Forum
Removing Huawei equipment from government use is the only choice, according to Arrington, "because the risk is so!-->…
Chief of US Security on Cyberthreats: We Cannot Solve It Alone
US government representatives frequently use the security-focused RSA Conference to outline policy positions and!-->…
Milton Security Group and SynED Collaborate to Expand California’s Cyber…
The cybersecurity company Milton Security Group and SynED have partnered to expand job prospects in California's!-->…
Voice assistant devices can be secretly controlled by hackers using ultrasonic…
By sending ultrasonic waves through solid materials, researchers have found a new way to attack voice-controlled!-->…
Cartersville City paid a $380,000 ransom to have file access restored.
Cartersville, Georgia, paid a ransom of $380,000 to restore access to their files, according to city officials,!-->…
In terms of cybersecurity, which industry leads the way?
In the blog post Grading Cybersecurity Around the Globe, I provided a summary of Tenable's first Global!-->…
Cyber Security and Manufacturing A Briefing for Manufacturers
Manufacturing is a significant target for cybercriminals. This can result in the theft of sensitive data,!-->…
The Growth Of Data Professions
The digital age has brought with it the ubiquity of data. Ubiquitous data, of all kinds, has necessitated the!-->…