It’s Not Information Until It Is Shared – Safely
While the current COVID-19 pandemic has put the world’s attention on a human virus, the threat of computer viruses remains real.
A Cost-Effective Solution to Protecting Your Data
It's easy to overestimate how secure a workspace really is. Experience shows that in the workplace, computer theft is very often overlooked.
Guarding the Central Nervous System of the World
We have become utterly dependent on data. And yet, for the vast majority of systems, the physical points of access to our data networks remain unguarded.
The Myriad Facets of Computer System Security
Most cybsersecurity solutions are designed to react to an incursion, rather than to prevent it, leaving the billions of data ports and connectors unguarded.
Taming the Wild, Wild World of Cybersecurity
There is remarkably little consensus on reliable sources for cyber defense. Rarely has so much been invested with so little assurance of knowledge?
When It Comes to DIKW, It’s Never Easy to Get Smart
The pyramid of Data-Information-Knowledge-Wisdom (DIKW) has become a critical element for defending against network contamination and sabotage.
The Simple USB Flash Drive is Not So Simple After All
Widespread are the daily breaches in which authorized personnel thoughtlessly charge or sync their personal mobile device through a USB port at work.
The Future of Cybersecurity Spending
According to a report released by data-security company Varonis, cybersecurity budgets have increased by 141 percent between 2010 and 2018.
The Physical Side of Cybersecurity
In most organizations, the obvious, physical points of access into data and information systems – namely, USB port – are simply left unguarded.
The Urgent Gap in Cybersecurity
So much action and activity is seen in cybersecurity today that the dramatic increase in spending for it has been described as climbing a mountain.
Safeguards Versus “The Perfect Weapon”
The mystery of cyber warfare is that many of the most impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.
Why Should the Obvious be Strange?
Chilling research has demonstrated that even the best-intentioned workers don’t hesitate to connect personal devices to the data system at work.