4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
The Accidental Insider Threat – A clear and present risk

The Accidental Insider Threat – A clear and present risk

Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer screens and we often forget about one the biggest risks organizations face – the insider. The insider can be broken into two categories, 1) the accidental insider who is duped...
Do we need a new standard for network testing and security?

Do we need a new standard for network testing and security?

This question was posed by a Forbes Technology Council member who points out that with the increase in devices connected to networks, cybersecurity has become part of every C-level, staff member and third-party vendor’s role to help manage risk of data...
Cybersecurity 2019 – Detection Over Prevention

Cybersecurity 2019 – Detection Over Prevention

As the number of attack vectors increases, making it easier for cyber criminals to find ways around the controls it is more important than ever to have a proactive and layered approach to cybersecurity.  However, organizations of all sizes need to face an...
What is Credential Stuffing?

What is Credential Stuffing?

Credential stuffing has been in the news because it is a method of attempting to take over accounts of a company by using the databases of known breaches to ‘stuff’ thousands or millions of known credentials into an automated bot and attempting to see if they can get...
NIST CSF – Part 3 – Detect

NIST CSF – Part 3 – Detect

The NIST Cyber Security Framework (NIST CSF) is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...