Does your firm need a certified incident handler on the team? Incident handlers manage the situation that happens after a cybersecurity attack. They plan, manage, coordinate, and communicate in order to contain and mitigate the attack’s effects. In this article, Tiru Dehariya discusses some of the benefits that come with having an incident handler on board and when to look for when hiring one.
Is blockchain technology the next big thing in cybersecurity? The implementation of blockchain as a solution for cybersecurity can limit the number of targets a hacker can attack. The process of decentralization creates a more secure system and prevents easy access for cyber-criminals and potential fraud.
All businesses should practice cybersecurity! In this article, Ashley Lipman gives tips for businesses both big and small on creating a cybersecurity focused culture. Ensure that your data is secure and that your employees don’t fall for scams and tricks with these tips.
Did you know that data science can be applied to the cybersecurity field to help protect against attacks and identify suspicious behavior? In this article, Peggy Morgan talks about the benefits of using data science to improve techniques and create better programs against cyber threats.
PHP is a cornerstone of the modern internet, with 80% of sites using it. Now, as the end of life for PHP 5.x version gets closer and closer, a whopping 62% of the internet is estimated to be vulnerable to looming security issues.
We know everything there is to know about blockchain, at least in theory. Still, many would mistakenly regard it as if it were solely related to cryptocurrency, and fail to see the full potential it offers. Victor Stolyarenko knows where the best fruits are hidden.
Meltdown and Spectre have been causing some scares lately, as tech companies try to keep up with their cybersecurity and fix these vulnerabilities. In this article, Patrick Londa discusses how intent breakdown plays a hand in the game.
What steps can you take to protect your business from cyber threats? Find out some tips and tricks to keep you safe and what preventive measures you can take in this informative article by Roman Patel.
What’s more secure than a guard dog? How about an open source machine learning-based project? Apache Spot is hunting down cyber threats and needs contributors.
Every Monday we take a step back and look at all the cool stuff that went down during the previous week. Last week we had a lot of important and interesting news going on in the technology world; Node.js 10 was released, we welcomed a new index to the family, we had a fun review of 5 things we can hate about Go and the list goes on.
More data breaches, more problems for developers. The rising risks in cybersecurity mean more developers need to improve their skills in this critical field. Nathan Sykes explains why developers with a background in data security are going to keep us safe in 2018.
We’ve been talking about the advantages blockchain brings to the finance industry but how about cybersecurity? Blockchain is revolutionizing multiple industries including cybersecurity but one question lingers: *how* can this technology help fight cyber attacks? We talked with Floyd DCosta, co-founder at Block Armour about the role the technology behind Bitcoin plays in blocking (if possible) cyber attacks.
The 2017 DevSecOps Global Skills Survey has found that formal software education is leaving DevOps engineers unprepared for the demands of the job. Why are schools leaving DevOps and security concerns off the curriculum?
Operational resilience. It’s the ideal every cybersecurity-focused organization strives towards. But in a few years, it might be little more than table stakes — here’s why.