Penny Swift

Apps Image

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed

Shutterstock 156471320

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2

Shutterstock 117915073

Conference Call Survey – The Waiting Game

Conference Call Survey Online conference calls using Cloud and Connected devices have become a norm in most modern businesses. As long as employees can access a computer, or have a smartphone or other mobile device available, they can make the

Power Women

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women.

Breach

Cybersecurity Survey Reveals Endpoint Risk

Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black

Silicon Valley

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding, new hotspots are emerging that offer fantastic opportunities

Cyber Threats

Cyber Breach Much Worse Than Reported

US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people

Shutterstock 164512745

Controversial Cybersecurity Bill A Threat To Privacy

Controversial Cybersecurity Bill As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may

Big Data Marketing

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of

Wild Wild West

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from

It Pro

Most IT Professionals Use The Internet To Cut Costs

Improving Efficiency With The Cloud A major percentage of IT professionals are following cloud adoption strategies to improve IT efficiencies and reduce their costs. Additionally, a large percentage of professionals see cloud usage and cost tracking as vitally important to

White House Details Its Cybersecurity Efforts For 2015

Cybersecurity Efforts For 2015 The White House has issued a fact sheet that details its efforts to ensure that cyber defense strategies are meeting the critical cybersecurity challenges currently facing the USA. This is in response to the increased sophistication

Joe Payne Ceo Code42

Code42 Appoints Joe Payne As New CEO – Sight On $75 Billion Market Opportunity

Code42 Appoints Joe Payne As New CEO The US endpoint data protection and security company, Code42 has appointed experienced software-as-a-service (SaaS) executive, Joe Payne as its new president and chief executive officer (CEO). Payne, who has a strong reputation for

Threats Damage

Mobile Phones – Cyber Security Threat Within US Department of Defense

Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the risk of cyber threat from inside agencies. It also cites

Security Breach

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law