Penny Swift

Apps Image

Report: Cybercriminals Rely On People To Access Corporate Environments

August 27, 2015

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed

Read More
Shutterstock 156471320

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

August 20, 2015

Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2

Read More
Shutterstock 117915073

Conference Call Survey – The Waiting Game

August 19, 2015

Conference Call Survey Online conference calls using Cloud and Connected devices have become a norm in most modern businesses. As long as employees can access a computer, or have a smartphone or other mobile device available, they can make the

Read More
Power Women

Are Women Discriminated Against In The Tech Sector?

August 18, 2015

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women.

Read More
Breach

Cybersecurity Survey Reveals Endpoint Risk

August 13, 2015

Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black

Read More
Silicon Valley

10 Trending US Cities For Tech Jobs And Startups

August 12, 2015

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding, new hotspots are emerging that offer fantastic opportunities

Read More
Cyber Threats

Cyber Breach Much Worse Than Reported

August 6, 2015

US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people

Read More
Shutterstock 164512745

Controversial Cybersecurity Bill A Threat To Privacy

August 5, 2015

Controversial Cybersecurity Bill As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may

Read More
Big Data Marketing

Digital Marketing Driven by Cloud, Big Data and IoT

August 5, 2015

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of

Read More
Wild Wild West

Domain Shadowing – Wild West Of Internet Cyber Attacks

July 29, 2015

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from

Read More
It Pro

Most IT Professionals Use The Internet To Cut Costs

July 16, 2015

Improving Efficiency With The Cloud A major percentage of IT professionals are following cloud adoption strategies to improve IT efficiencies and reduce their costs. Additionally, a large percentage of professionals see cloud usage and cost tracking as vitally important to

Read More

White House Details Its Cybersecurity Efforts For 2015

July 15, 2015

Cybersecurity Efforts For 2015 The White House has issued a fact sheet that details its efforts to ensure that cyber defense strategies are meeting the critical cybersecurity challenges currently facing the USA. This is in response to the increased sophistication

Read More
Joe Payne Ceo Code42

Code42 Appoints Joe Payne As New CEO

July 14, 2015

Code42 Appoints Joe Payne As New CEO The US endpoint data protection and security company, Code42 has appointed experienced software-as-a-service (SaaS) executive, Joe Payne as its new president and chief executive officer (CEO). Payne, who has a strong reputation for

Read More
Threats Damage

Mobile Phones – Cyber Security Threat Within US Department of Defense

July 9, 2015

Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the risk of cyber threat from inside agencies. It also cites

Read More
Security Breach 10 Useful Cloud Security Tools

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

July 8, 2015

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law

Read More
Kelly Dyer
Achieving Data Security Compliance As individuals, we go through life sharing information about ourselves in every aspect of our daily existence. From credit checks for securing a loan, through to entire personal and family medical ...
Using AWS AppConfig Feature Flags
AWS recently launched AWS AppConfig Feature Flags. Feature flagging is a powerful tool that allows engineers to safely push out new features to customers, but doing so in a measured and usually gradual way. In this blog ...
Louis
Employees’ privacy, personal identities and privileged access credentials are at risk because enterprises are sacrificing security to get more work done. While 85% of enterprises have a dedicated budget for mobile security, just over half, ...
Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
Dmitry Chekalin
How Much Should a Modern Website Cost? A website is a valuable instrument for growing your business. Your website presents your brand to users. Also, it compels your prospects to become your customers. So, how ...