Guest Contributor



Guest Contributor: Sterling Kellis, Assistant Dean of Technology, College of Information Systems and Technology, University of Phoenix American jazz musician Charles Mingus once said, “Making the simple complicated is commonplace, but making the complicated simple, awesomely simple, that’s creative genius.” Today, the security industry is in need of a stroke […]

Cybersecurity Upskilling and Lifelong Learning in the Digital Age




Editor’s note: The following was originally posted on Schneider Electric’s blog.  With their permission, and because this is an important topic, we decided to republish it here for our readers.  We applaud Schneider Electric for their willingness to address this attack against one of their customers head-on, without flinching, and […]

One Year After Triton: Building Ongoing, Industry-Wide Cyber Resilience


Guest Contributor: Kim Crawley I’ve been playing quite a bit of Assassin’s Creed Syndicate. Yes, I know the game came out in 2015. But in the past several years, I’ve played Assassin’s Creed II, Assassin’s Creed Brotherhood, Assassin’s Creed Revelations, Assassin’s Creed III, Assassin’s Creed Liberation, and Assassin’s Creed Rogue. […]

These Web Browsers Will Help You Surf the Web Stealthily


Guest Contributor: Aravind P R E, Product Consultant, ManageEngine A common question posed by enterprises when it comes to defending against cyberthreats is “Which operating system is most secure?” There are only a few major operating systems (OSs) available, so enterprises aren’t left with many choices. Out of the big […]

Linux Security and Patching: Are You As Safe As You ...




Guest Contributor: Rilind Elezaj, Director of Digital Marketing, Creative27, https://creative27.com Today, software is at the heart of all essential business processes, hence the need for organizations to build and enhance security into their respective information technology and application development process to avoid compliance violations, data breaches and also to protect the digital transformation […]

Integrating DevSecOps with Your App Development Lifecycle


By John Torres & Ron Chandler The Internet-of-Things (IoT) revolution has certainly taken the “cyberspace” by storm. According to a Forbes article published last year, by 2025, approximately 80 billion devices will be connected to the Internet. To put that in perspective, approximately 11 billion devices were connected to the […]

Practical Tips for IoT Security – Are You Secure?



Guest Contributor: Gary Hayslip, CISO Six Fundamental Precepts for the Modern CISO Role I remember growing up as a kid there was this bookstore near my house called The Cobblestone Bookstore. It was family-owned and in a strip mall. They had a section in the back of the store that was […]

I, CISO



Guest Contributor: Brandon Reich Over the past year, we’ve heard a lot of big buzzwords in conversations at different conferences, meetings, and events. Deep learning, artificial intelligence, and cybersecurity are hot topics, and these trends undoubtedly define the current landscape. In today’s evolving business environment, none is more complex and […]

The Evolution of Video Data Protection: Reliability, Performance and Security