QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and what can you…
Posts TaggedSecurity Intelligence
Managing Cybersecurity Costs: Bake These Ingredients Into Your Annual Budget
As businesses across all industries evolve, once discretionary expenses become operating costs. Insurance coverage, for example, is pretty much ‘a must’ across many industries. The latest may be cybersecurity costs,…
Hybrid Cloud Adoption Brings Security on the Go
Hybrid cloud environments are a common sight in today’s digital world. IBM’s Assembling Your Cloud Orchestra report found 85% of organizations already utilize a hybrid cloud and 98% anticipate having…
Misconfigurations: A Hidden but Preventable Threat to Cloud Data
Working in the cloud has many advantages. But to handle your information safely, you should know how to defend against the common problem of misconfigurations leaving cloud data open to…
5 Cybersecurity Best Practices For Planning Ahead
Putting best practices in place is the most efficient way to combat cybersecurity threats. But that’s easier said than done, as there are a lot of forces working against our…
Preparing a Client Environment for Threat Management
A key part of making any threat management program successful is ensuring it maps properly to the client’s needs. In the past, this has been challenging for many groups providing…
Social Engineering And Social Media: How to Stop Oversharing
You’ve done your due diligence, practice good security hygiene and have the best security tools available. Now, your security posture is strong. But, your plan is only as good as…
Peaks and Valleys: The Mental Health Side of Cybersecurity Risk Management
There is one risk cybersecurity experts often overlook: burnout. We can build on threat detection and incident response capabilities and use cybersecurity risk management frameworks, such as NIST CSF, to…
What is STRIDE and How Does It Anticipate Cyberattacks?
STRIDE threat modeling is an important tool in a security expert’s arsenal. Threat modeling provides security teams with a practical framework for dealing with a threat. For example, the STRIDE…
Cybersecurity for Healthcare: Addressing Medical Image Privacy
Medical imaging devices have greatly improved patient care and become a critical part of modern medical treatment. But, these devices weren’t always connected in ways they are today. Today’s tools…