Penny Swift

Report: Cybercriminals Rely On People To Access Corporate Environments

By Penny Swift | August 27, 2015

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

By Penny Swift | August 26, 2015

NSA Planning For Quantum Resistant Algorithms The National Security Agency (NSA) has announced that it plans to introduce methods of cryptology that will make quantum computers secure. Acknowledging that quantum computers are likely to become a reality in the not

Flagship State University To Spend Millions On Cyber Security

By Penny Swift | August 25, 2015

New Jersey’s Flagship State University to Spend Millions on Cyber Security Rutgers University in New Brunswick is to spend up to $3 million on cyber security to prevent hackers crippling the university’s computer networks. This expensive action is in response

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

By Penny Swift | August 20, 2015

Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2

Conference Call Survey In The Cloud – The Waiting Game

By Penny Swift | August 19, 2015

Conference Call Survey Online conference calls using Cloud and Connected devices have become a norm in most modern businesses. As long as employees can access a computer, or have a smartphone or other mobile device available, they can make the

Are Women Discriminated Against In The Tech Sector?

By Penny Swift | August 18, 2015

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women.

Target of the Next Big Breach

Cybersecurity Survey Reveals Endpoint Risk Five Times Bigger Than Cloud or Networks

By Penny Swift | August 13, 2015

Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black

10 Trending US Cities For Tech Jobs And Startups

By Penny Swift | August 12, 2015

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities

Adobe Releases Another Security Update For The Dying Flash

By Penny Swift | August 8, 2015

Growing Security Concerns Surrounding Adobe Flash  Adobe has today released yet another security update for Adobe Flash Player. Aimed at Flash developers, the update is the 12th since the beginning of 2015, and follows recent pleas from Facebook’s newly appointed

Cyber Breach Much Worse Than Reported

By Penny Swift | August 6, 2015

US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people

POPULAR

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a ...
State of the Cloud Report In 2017

State of the Cloud Report In 2017

Cloud Report 2017 As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Fintech Dark Web

An End to Credit Cards? How the Dark Web Is Pushing Fintech Towards Blockchain

Dark Web Pushing Fintech Towards Blockchain As Jennifer Klosterman points out, “There are many strong reasons for reputable businesses to ...
Data Breaches And Concerns Over Password Storing Methods

Data Breaches And Concerns Over Password Storing Methods

Data Breach Concerns Data breaches have been plentiful over the past few years, and companies have lost millions of dollars ...
THE PARADOX OF CLOUD AND COLOCATION SOLUTIONS

THE PARADOX OF CLOUD AND COLOCATION SOLUTIONS

Cloud and Colocation Solutions According to Aberdeen Group and Ventana Research, one out of four enterprises surveyed expect their data ...
The 800-Pound Cloud Gorilla Makes a Move

The 800-Pound Cloud Gorilla Makes a Move

Amazon Connect Oh-oh! First, books; then all of retail and cloud services. Now, call centers??? What is Amazon up to? ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...