Security

Gatwick, UK’s no.2 airport, shows flights on white boards after IT fails

By CloudBuzz / August 20, 2018

LONDON (Reuters) – Gatwick, Britain’s second busiest airport, was forced to post flight information on white boards on Monday after an IT glitch meant its digital screens failed. The airport, 30 miles south of London which primarily serves passengers heading

Chinese hackers targeted U.S. firms, government after trade mission: researchers

By CloudBuzz / August 16, 2018

WASHINGTON/LONDON (Reuters) – Hackers operating from an elite Chinese university probed American companies and government departments for espionage opportunities following a U.S. trade delegation visit to China earlier this year, security researchers told Reuters. Cybersecurity firm Recorded Future said the

real time hacking attacks

July’s Most Wanted Malware: Attacks Targeting IoT and Networking Vulnerabilities on the Rise

By CloudBuzz / August 15, 2018

SAN CARLOS, Calif., Aug. 15, 2018 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, has published its latest Global Threat Index for July 2018, revealing a significant increase in exploits targeting three major IoT

Don’t Forget Victimology as a Cybersecurity Strategy

By CloudBuzz / August 7, 2018

Technology and IT principles play an undeniable role in cybersecurity defense, but criminological security principles should not be overlooked. As cybersecurity professionals overwhelmed with compliance requirements, regulations, and a multitude of tradecraft frameworks, we sometimes lose focus on what we

Health records ‘put at risk by security bugs’

By CloudBuzz / August 7, 2018

Health records of almost 100 million patients worldwide were put at risk by security issues with a popular patient management system, researchers say. Almost 30 bugs were found in the OpenEMR system, by a cyber-security group called Project Insecurity. OpenEMR

Data Protection Officers

Free Linux Firewalls of 2018

By CloudTweaks / July 11, 2018

A firewall is an important aspect of computer security these days, and most modern routers have one built in, which while helpful, can be difficult to configure. Fortunately there are also distributions (distros) of the free operating system Linux which

API security

3 Steps to Better Security in the API Economy

By CloudTweaks / January 24, 2018

API Security Whenever you’re working online with the Internet, security is also a top concern. Any mistakes or lapse of judgments can cost a lot of money and potentially even entire business, credibility and reputation. But, as an online business

How will GDPR affect your US-based business?

By CloudTweaks / December 21, 2017

The GDPR Affect From the 25rh of May, 2018, the laws governing data storage and personal privacy in the European Union will undergo a comprehensive overhaul as the General Data Protection Regulation comes into force. For companies based in the

Technology Certification Courses

Top Five Technology Certification Courses To Choose From In 2018

By CloudTweaks / December 18, 2017

Technology Certification Courses Gartner predicts that the global public cloud services market is projected to grow by 55 percent in the next three years and is expected to reach $383.3 billion by the end of 2020. Today, cloud computing helps enterprises

blockchain credit security

Is blockchain a solution for credit security?

By CloudTweaks / December 11, 2017

Blockchain Credit Security In the last 30 years, FICO scores were considered a reliable solution to measure creditworthiness and attach a risk score to each applicant. As the sub-prime mortgage crisis of 2008 proved it, this system was neither accurate

Thought Leaders

API security

3 Steps to Better Security in the API Economy

API Security Whenever you’re working online with the Internet, security is also a top concern. Any mistakes or lapse of ...
Cloud Computing In Education

Cybersecurity Policies Must Address Internal Threats

Cybersecurity Policies The contentious U.S. election campaign offered up many highlights, but the aftermath of election night – explosive cyberattack ...
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Part 1 - Identity Assurance by Our Own Volition and Memory

Part 1 – Identity Assurance by Our Own Volition and Memory

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that ...
The ID Federation: What Technology Can Displace The Password?

The ID Federation: What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have ...
Ransomware's Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to ...

JOB OUTLOOK

Survey: Millennials Don’t See Career Path in Cybersecurity

Survey: Millennials Don’t See Career Path in Cybersecurity

As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only ...
Toronto added most North American tech jobs in 2017, with wages lower than any US hub

Toronto added most North American tech jobs in 2017, with wages lower than any US hub

For the second year in a row, CBRE’s tech talent report found that Toronto is North America’s fastest growing tech ...
The New Kids On The Block: Data Protection Officers

The New Kids On The Block: Data Protection Officers

Data Protection Officers The General Data Protection Regulation (GDPR) is officially here. Yet, organizations are still unaware, are ignoring, or ...