The Identity Theft Resource Center (IRTC) reports that in the first 6 months of 2018 companies in the United States publicly disclosed 668 instances of sensitive business and consumer information being compromised by cyber attacks. Adding that 22,408,258 records were exposed in these breaches. These breaches are a common subject […]

SANS Institute Whitepaper on Breach Avoidance


A data breach is one of the most dreadful and increasingly common business threats these days.  Last year, the number of records compromised in publicly disclosed data breaches surpassed 2.5 billion.  Here are the top security breaches in history as presented by TeleMessage.

Infographic: The Top Security Breaches in History


  Last October, a Heathrow employee lost a USB stick containing 76 folders and more than 1,000 confidential files, including the names, dates of birth, passport numbers and other personal information related to aviation security staff. The USB stick was found by a member of the public, who after rummaging […]

Heathrow Airport Fined Over Data Breach Involving a Misplaced USB ...



Read all three pages of this infographic to understand the unique insight that Angela Oborne, Regional Director – Security & Technology Consulting at Guidepost Solutions brings to the security industry. You will learn about: The ASIS Young Professionals Council’s recent research How Millennials fit into the security industry What the […]

Guidepost Solutions – Angela Osborne – ASIS Young Professionals Council


Malwarebytes just released their Q3 2018 Cybercrime Tactics and Techniques report.  There are a ton of fascinating findings; some are what you might expect and others are surprising. They combined intel and statistics gathered from July through September 2018 from their Intelligence, Research and Data Science teams with telemetry from both […]

A Review of the Malwarebytes Cybercrime Tactics and Techniques: Q3 ...


New Study Uncovers Network Security’s Biggest Challenges ProtectWise, a leader of Cloud-delivered Network Detection & Response (NDR), released a new report, “The Evolving State of Network Security,” that looks at the biggest network security challenges companies face including staffing priorities, the need for specialized roles, and the inherent limitations of endpoint security. The […]

The Evolving State of Network Security



Visual & Access Control Identification Veteran Brings Growth & Customer Centricity Experience to Global ID Solutions Leader MIAMI, Florida – Plasco ID, the world’s largest integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, […]

Plasco ID New COO to Lead Expansion of Identification Solutions ...


Nyotron, an Israeli company, and provider of the industry’s first OS-Centric Positive Security solution to strengthen endpoint protection announced that the company has entered into a strategic partnership agreement with Ingram Micro to help it accelerate its global presence – particularly in the United States – and build its global channel ecosystem. […]

Nyotron Enters Into Strategic Partnership With Ingram Micro – Why ...


Malware and Hacking Responsible for Nearly Three-Quarters of All Breaches in 2018 “Financial organizations regularly handle sensitive, regulated data like home addresses, bank statements, and Social Security numbers,” said Rich Campagna, CMO of Bitglass. “This type of information is an incredibly attractive target for criminals, meaning that financial services firms […]

Report: Number of Financial Services Breaches in 2018 Nearly Triple ...



She always thinks about how to make things better – and loves making that happen After studying international business and working in the fashion industry in New York, Sung Cho made the big shift to the tech industry.  As the VP of Growth and Strategy for a leading provider of […]

An Interview with Sung Cho, VP of Growth and Strategy ...


With a shortage of skilled security professionals in the market, companies face an overload in security alerts every day. Security Orchestration and Automation Response (SOAR) platforms have become the latest trend in the cybersecurity industry to combat the waste of IT time and resources. Check out this infographic to see […]

The SOAR Solution to Security Operations Overload


A Robot is a Robot Until it is Called a Washing Machine Guest Contributor: Steve Reinharz, President, Robotic Assistance Devices, Inc. ‘Change’ is one of the most overused words and concepts in almost every industry. It gets people’s attention; it clicks and is, therefore, a powerful word for promoters to use. People […]

CHANGE IS HERE



Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...


Guest Contributor: Nina Pineda, Consultant, Pod Group The internet of things is on the rise, helping organizations digitally transform their businesses and propel them into the future; its integration across labor-intensive industries is evolving their operations and strategies. It is also changing human behavior as we know it as IoT […]

Strengthen Your Internet of Things Security: Here’s How


The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...