For many, their soundtrack consists of upbeat playlists that are played just a little too loud during long commutes and road trips. For others, an informational podcast will do the trick. If you have any interest in the security and risk industry, get a pen and a piece of paper to write down our carefully […]
Risk and Compliance
Trends to Watch for in 2021
Trends to Watch for in 2021 It’s the time of year when a number of companies come out with their security and risk trends for the coming year. Cybersecurity continues to be a hot topic for 2021, and with more businesses operating with a virtual staff more than ever before, security and risk is becoming […]
GRC: Why it is important for your business
Copyright: Photo by energepic.com from Pexels While you may have heard the term GRC, or governance, risk and compliance before, what you may not know is its importance to your business. In fact, GRC can be applied and utilized in any organization out there. It is a management strategy that can ultimately save you time when it comes […]
Physical security risk assessment: The dream and the reality
The following is a guest post by a 2019 Secure360 Start-Up Corner sponsor, Quill Security. Physical security is fiendishly complicated. There are hundreds of threats to worry about, thousands of individuals and assets to protect and tens of thousands of security measures to consider. Nobody has the security staffing to stay on top […]
The ABC’s of AI: Here’s what you need to know
Artificial intelligence, or AI, appears to be a growing trend as an application of technology. You may have already heard about it in the news or on websites stating they use AI technology; but what is it exactly? Artificial intelligence is the process of teaching machines to perform or complete tasks that might normally […]
Responding to a data breach
It seems as though every spy thriller made since Ian Fleming romanticized the Cold War has been about nefarious persons stealing data or hacking into extremely important computer networks to meet their dastardly deeds. It’s no wonder, either, as cybersecurity has become one of the top security concerns (pun intended) virtually around the globe […]
Your guide to two-factor authentication [infographic]
With all of the minimum-security requirements on passwords these days (like lowercase and capital letters, special characters, numbers, etc.), one would think that passwords are very safe. However, with the right skillset and technology, even rookie hackers can sometimes crack these codes. Enter: Two-factor authentication. Two-factor authentication is an extra layer of security that uses […]
Back to school: the risks of wearables
That special time is upon us once again, when the summer comes to an end, kids begrudgingly prepare for their upcoming school year and parents rejoice at the prospect of occupied little ones. We are no stranger to the laundry list of items that need to get accomplished before the school year starts, year after […]
8 steps to building your first cybersecurity resume: a guide for recent grads
So, you’re trying to start down the path of cybersecurity employment. If you’ve used killer keywords and managed to make it through whatever Applicant Tracking System (ATS) your potential employers are using in their recruitment process and have successfully placed your resume under the eyes of those potential employers, they can see that you have […]
Your summer cybersecurity soundtrack: Podcasts
For many, their summer soundtrack consists of upbeat playlists that are played just a little too loud during long commutes and road trips. For others, an informational podcast will do the trick. If you have any interest in the security industry, get a pen and a piece of paper to write down your carefully curated […]