Penny Swift

Apps Image

Report: Cybercriminals Rely On People To Access Corporate Environments

August 27, 2015

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed

Read More
Shutterstock 156471320

Call For Public-Private Cyber-Catastrophe Reinsurance Scheme In The UK

August 20, 2015

Public-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2

Read More
Shutterstock 117915073

Conference Call Survey – The Waiting Game

August 19, 2015

Conference Call Survey Online conference calls using Cloud and Connected devices have become a norm in most modern businesses. As long as employees can access a computer, or have a smartphone or other mobile device available, they can make the

Read More
Power Women

Are Women Discriminated Against In The Tech Sector?

August 18, 2015

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women.

Read More
Breach

Cybersecurity Survey Reveals Endpoint Risk

August 13, 2015

Cybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black

Read More
Silicon Valley

10 Trending US Cities For Tech Jobs And Startups

August 12, 2015

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding, new hotspots are emerging that offer fantastic opportunities

Read More
Cyber Threats

Cyber Breach Much Worse Than Reported

August 6, 2015

US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people

Read More
Shutterstock 164512745

Controversial Cybersecurity Bill A Threat To Privacy

August 5, 2015

Controversial Cybersecurity Bill As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may

Read More
Big Data Marketing

Digital Marketing Driven by Cloud, Big Data and IoT

August 5, 2015

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of

Read More
Wild Wild West

Domain Shadowing – Wild West Of Internet Cyber Attacks

July 29, 2015

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from

Read More
It Pro

Most IT Professionals Use The Internet To Cut Costs

July 16, 2015

Improving Efficiency With The Cloud A major percentage of IT professionals are following cloud adoption strategies to improve IT efficiencies and reduce their costs. Additionally, a large percentage of professionals see cloud usage and cost tracking as vitally important to

Read More

White House Details Its Cybersecurity Efforts For 2015

July 15, 2015

Cybersecurity Efforts For 2015 The White House has issued a fact sheet that details its efforts to ensure that cyber defense strategies are meeting the critical cybersecurity challenges currently facing the USA. This is in response to the increased sophistication

Read More
Joe Payne Ceo Code42

Code42 Appoints Joe Payne As New CEO

July 14, 2015

Code42 Appoints Joe Payne As New CEO The US endpoint data protection and security company, Code42 has appointed experienced software-as-a-service (SaaS) executive, Joe Payne as its new president and chief executive officer (CEO). Payne, who has a strong reputation for

Read More
Threats Damage

Mobile Phones – Cyber Security Threat Within US Department of Defense

July 9, 2015

Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the risk of cyber threat from inside agencies. It also cites

Read More
Security Breach 10 Useful Cloud Security Tools

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

July 8, 2015

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law

Read More
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Gary Bernstein
Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win market share and beat the competition, Harvard Business Review reveals. Yet, just 10% of businesses ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...