HelpSystems Acquires Vera to broaden data security portfolio

See for yourself, we’re making headlines.


Mitigating Cloud Misconfiguration Risks to Your Data

The security concerns about cloud infrastructure that shadowed the technology from its nascent stages have largely dissipated as cloud adoption has spread and security has improved. While even public cloud infrastructure is now far more sec …

October 17, 2019

Daily Briefing

A Yahoo News investigative report concludes that Russia’s SVR foreign intelligence service developed the disinformation that US Democratic National Committee data director Seth Rich was murdered to cover up corruption by then-Presiden …

September 19, 2019

Extending Security to Fourth Parties Your Business Needs But Doesn’t Control

While there is much discussion about the data security and privacy risks created by third parties, another source of risk can be significant but overlooked: that from fourth parties – those vendors that your vendors use – who may be int …

September 19, 2019

The CFO’s Perspective: Steps to Quantifying Cyber Risk

Does an increase in spending lead to an overall reduction in risk? Not necessarily. An organization may spend millions on network security controls but still get breached through an application code vulnerability. New attack methods and new …

September 19, 2019

Encryption 101 – Fact vs. Fiction

The common belief that encryption enables bad behavior primarily used by thieves, international terrorists, and other villainous characters is simply not true. Here’s why. Encryption engenders passionate opinions and reactions from a …

July 2, 2019

Secure Online Activity During Summer Travel

Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready. Misplacing or having your devices stolen can put a damper on any vacation, says Kelvin Coleman, executive director of the Nat …

June 19, 2019

Controlling Data in a Post-cloud World

Since inception, cybersecurity has focused on bolting-on products to the IT infrastructure that runs the world – bolstering the network perimeter in an effort to prevent malicious attacks from getting in and company data from inapprop …

June 7, 2019

The CyberWire Daily Podcast

n today’s podcast, we hear that a US Energy Department report alludes to a March cyber incident. Citycomp refused to yield to blackmail, so now its client data is being leaked. The US Department of Homeland Security has issued Binding Ope …

May 1, 2019