Georgia Tech Cyberattack Exposes Data of 1.3 Million People

Posted on April 6th, 2019 by Responsible Cyber

Names, addresses, Social Security numbers, and birth dates may have been pilfered in the attack. Georgia Tech this week revealed that an attacker infiltrated a central database and stole personal information on up to 1.3 million current and former faculty, students, staff, and university applicants.  The unknown attacker or attackers broke in via a Georgia […]

Read More

6 Essential Skills Cybersecurity Pros Need to Develop in 2019

Posted on April 6th, 2019 by Responsible Cyber

In a time of disruption in the security and tech worlds, cybersecurity professionals can’t afford to become complacent – even in the face of a skills shortage. 1 of 7 Image Source: Adobe Stock (vchalup) It’s definitely a job seeker’s’ market out there in the cybersecurity employment pool. According to an about-to-be released report from […]

Read More

Privacy & Regulatory Considerations in Enterprise Blockchain

Posted on April 6th, 2019 by Responsible Cyber

People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is estimated by Gartner to create $3.1 trillion of business value by 2030, yet many organizations lack a clear understanding of its applications, the risks and benefits […]

Read More

Introducing ClearPass Device Insight: Cloud-Enabled, AI-Powered Device Discovery and Profiling

Posted on April 6th, 2019 by Responsible Cyber

As new types of devices flood into our environments, networking and security teams are struggling to keep up. They need to understand which devices should be on the network and what they should be allowed to access. The slow and somewhat predictable era of workstations and laptops has exploded into a dizzying array of Internet […]

Read More

Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

Posted on April 6th, 2019 by Responsible Cyber

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making.However, the standard process of 3rd party threat assessment as practiced today is both time consuming and expensive.Cynet changes the rules of the game with a free threat assessment offering based on more than 72 hours of data collection and enabling […]

Read More

How Can A Security Champion Help Your Development Team?

Posted on April 5th, 2019 by Responsible Cyber

A security champion serves as the voice of the developer while satisfying the needs of the business from a security perspective. In this episode we dig deeper into details on the role of the security champion and what effect having a champion can have on development and security. Listeners will learn about: How to identify […]

Read More

These two books explain how to fix our broken security industry

Posted on April 4th, 2019 by Responsible Cyber

The first step in fixing a problem is admitting you have one. The computer security industry has long been broken and needs some serious fixes. The world spends many billions of dollars fighting cybersecurity threats, more and more each year, and threats, risks and exploits are just getting worse. We have even accepted that computer […]

Read More

Security technologies that provide the most savings

Posted on April 4th, 2019 by Responsible Cyber

Many older, more well-established security technologies – data loss prevention (DLP), perimeter controls and policy management – provided the least in cost savings; all offering less than $200,000 in savings compared to their costs. “Those ‘brilliant basics’ are things we’ve been doing for 20 years… the things that are the bread and butter of security […]

Read More

Effective IoT Security Requires Machine Learning

Posted on March 30th, 2019 by Responsible Cyber

The legacy security model is based on the concept of a well-defined perimeter and the use of tools such as signatures, rules, and statistical analysis. While that model has provided significant value for a very long time, the limitations are highlighted by that fact that large-scale security breaches which are designed to evade traditional defenses […]

Read More

Latest iOS 12.2 Update Patches Some Serious Security Vulnerabilities

Posted on March 30th, 2019 by Responsible Cyber

Apple on Monday released iOS 12.2 to patch a total of 51 security vulnerabilities in its mobile operating system that affects iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.A majority of vulnerabilities Apple patched this month reside in its web rendering engine WebKit, which is used by many apps and […]

Read More