-
10 Hot Cybersecurity Companies to Follow in March 2020
Cybersecurity is a top priority for information technology teams these days. As both the capabilities and reliability of security technologies continue to improve, unfortunately so do data breaches, cyberattacks and ...
-
The Latest Scam: “Malicious Tagging” on Facebook
The Better Business Bureau is warning about a new scam called “malicious tagging” that is targeting Facebook users. In recent months, several thousand users of the social media site have ...
-
11 Steps to Take If You Lose Your Wallet
You’ve lost your wallet—or it’s been stolen—and your first instinct is to panic. But resist this urge. Instead, take these 11 steps after your wallet has gone missing. If you ...
-
Women Represent 20 Percent Of The Global Cybersecurity Workforce In 2019
Cyber has a gender problem, if our industry continues to regurgitate numbers from a 6-year-old report that states an alarmingly low percentage of women hold security positions. Research firm Frost ...
-
5 Social and Digital Security Tips for Educational Institutions
The explosion of the social and digital landscape is shifting the way schools engage with students, faculty, and the larger community. This new paradigm requires student, faculty and campus protection ...
-
New Research on Top Digital Threats Facing Retail Industry
With the surge of online shopping and e-commerce, digitalization has transformed the way retailers grow business and engage with consumers. Today, retail organizations rely on websites, marketplaces and social media ...
-
‘Major Initiatives in Cybersecurity’ Shows Everyone Can Contribute to Trust
How do we work toward a more secure Internet? In the Cyber Security discussions that take place in the various policy fora around the world, there is often little appreciation ...
-
Member News: Internet Society Chapters Focus on Security
Security on your mind: The Internet Society’s Chapter in Benin recently hosted a conference focused on online security and on connectivity issues. Much of the discussion focused on instability of ...
-
What is Encryption Key Management?
When it comes to data security, strong encryption is essential. But encrypting data becomes useless if you don’t secure your keys. As a well-known security analyst put it, “Locking the ...
-
Strong Customer Authentication Under PSD2
You’ve heard of PSD2 and even know what it stands for, but are you fully prepared for its ramifications and opportunities? Developed by the European Banking Association, this latest version ...