The Future of Cybersecurity Spending
According to a report released by data-security company Varonis, cybersecurity budgets have increased by 141 percent between 2010 and 2018.
The Physical Side of Cybersecurity
In most organizations, the obvious, physical points of access into data and information systems – namely, USB port – are simply left unguarded.
The Urgent Gap in Cybersecurity
So much action and activity is seen in cybersecurity today that the dramatic increase in spending for it has been described as climbing a mountain.
Safeguards Versus “The Perfect Weapon”
The mystery of cyber warfare is that many of the most impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.
Why Should the Obvious be Strange?
Chilling research has demonstrated that even the best-intentioned workers don’t hesitate to connect personal devices to the data system at work.
The Greatest Unguarded Threat to Network Security
The data ports and cable connections of data and IT networks offer the easiest, most numerous points of access for data theft, compromise, and infection.
Uncompromising Urgency
Most data security solutions depend on responding to threats after they occur. A rapid-reaction force doesn't replace the need for a perimeter of security.
Hiding in Plain Sight – the Essentials of Cybersecurity
What’s missing in most organizations is systematic protection for the physical points of access to their data network and information systems.
2019: The Year of the Data Breach
Four billion records, including credit card numbers and other sensitive information, have been exposed through data breaches in the first half of 2019.
The Achilles’ Heel of Cybersecurity
The Achilles heel of cybersecurity is the USB flash drive that is used at home and then is plugged in at work to infect networks with viruses and malware.