Guest Contributor



By Frank Baldwin, CEO 2X Systems If you’ve ever traveled by plane, you’ll know all too well how stress-inducing, tedious and often undignified going through airport security can be. In 2018, an estimated 292 million passengers traveled through UK airports alone. That’s 292 million people who would have had their bags […]

UPHOLDING SECURITY FOR GLOBAL AIRLINE PASSENGERS


By Brandon Cox Anyone planning to develop, deploy, or secure solutions that incorporate Microsoft 365 should download the latest version of the Security Configuration Benchmark for Microsoft 365. Not everyone knows these free guides from CIS Benchmarks exist. The newest version was published on December 20th and provides prescriptive guidance […]

New checklist to secure Microsoft Office 365 now available from ...



KnowBe4 has issued its Q4:2019 top-clicked phishing report analyzing the results of tens of thousands of email subject lines from simulated phishing tests. Unsurprisingly, security related and giveaway phishing emails garnered the most clicks. The top phishing lure that recipients were most likely to bite for: simulated phishing tests with an urgent […]

Security and Giveaway Phishing Emails Most Likely to Lure Users


Cyberattacks are becoming easier to carry out and will threaten the digital economy unless businesses innovate Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. That’s a bold statement, but not without warrant. Cybercrime represents one of the fastest-growing categories of crime in […]

Cybersecurity 2020: Innovate or Surrender


By Robin Tandon, Director of Product Marketing, Cloud Solutions, HID Global The way ID cards are used in the enterprise and on college and university campuses has changed dramatically in recent years.  Once a simple identification tool, corporate ID badges now provide the means to open doors and access IT […]

ID Card Issuance Moves to the Cloud



By Jascha Bryce Almost everyone puts a premium on cybersecurity these days. From average Joes to small and medium enterprises, to multinational companies, people have made a concerted effort to protect their online identity. In essence, Generation X paved the way for the evolutionary process of Internet security. This demographic […]

The Next Generation of Cyber Security Pros: Is Gen Z ...


By Greg Young, Vice President of Cybersecurity at Trend Micro DevOps is the new engine for global business growth. All over the planet, organizations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet there are challenges. Cybersecurity remains the number one […]

Securing DevOps: Why Culture is Key to Driving Company-Wide Success




By Mr. Shomiron Dasgupta, CEO & Founder, DNIF Vulnerability assessment (VA) and penetration testing (often shortened to “pentesting”) are effective techniques for identifying and eliminating risks in a software system. In IT security, a vulnerability is a kind of loophole or weak link in a software system. While penetration testing […]

How to perform penetration testing and vulnerability assessments


By Don Boxley, CEO and Co-Founder, DH2i (http://dh2i.com) “Digital transformation”—it’s a term used so often that it’s starting to lose its meaning. But before your eyes glaze over and you click to another page, let’s think about one of the biggest challenges that workforce digitization can bring about for those […]

4 Questions to Ask Before Investing in a New Network ...


By Andrew Lancaster Universities and colleges are expanding their range of cybersecurity courses every year. A survey of online programs shows that educators are working hard to keep up with the demand for cybersecurity training and bridge the skills gap. Whether you’re an industry newbie or experienced professional, there’s probably […]

University Options for Learning Cybersecurity