Posts about CyberSecurity

Cybersecurity Certificates to Boost Your Earnings

Cybersecurity is a hot topic for every CIO and CTO today. Every day new cyber incidents are reported. In 2018, Sears, Best Buy, Facebook and Panera Bread all reported cyber-attacks and incidents. This has increased the demand of professionals who can help the organizations secure their systems. So, if you have some really good cybersecurity certificates on your IT resume, you can present yourself as an ideal candidate. Such certifications open a tremendous window of opportunity for you to explore. Cybersecurity certificates are an excellent way to boost your earnings. With these certificates, you can increase your competence and [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]

Cybersecurity Best Practices

People often tend to think of cybersecurity as only an IT function, such as network security, or like a firewall or having antivirus on a computer.  Cybersecurity is driven at the organization level. It is composed of culture, behavior, goals, priorities and then protections, procedures and verification. Cybersecurity best practices are much more than at the IT level. Cybersecurity starts at the top with the executives and trickle down to management. Management needs to articulate plans to the technical architects, engineers, analysts and tools.  On the executive level, cybersecurity needs to be a business strategy. In the IT ranks, [...]

AI-Based Cyber Security: Blue Vector vs. Darktrace

Cyber Security threats are a dime a dozen today. Within the last two years everything from Presidential Elections to state governments has been at the mercy of hacking, malware and ransomware. Humans cannot keep up with the speed of these attacks The attacks are too frequent and harder to spot. AI-based programs are neccessary. These programs handle the attackes as they come in and optimize the system for threats in a way that acts as an automated defense system.   This approach is being adopted by various AI based cyber security firms. They aim to provide companies and governments with [...]