CyberSec News - December 2016

Government, banking, adult dating and pornography sites are the high profile global cyber attack targets over the last month.  In this month’s edition of CyberSec News, we are going to give you the details you need to know about these incidents.

Managing Secure Data Exchange in Autonomous Systems

 

Imagine a migratory group of blackbirds, innumerable, that seems to take to the air in one collective breath, or settle, in unison, in a field or on a tree-line. Or a pile of leaves, picked up and thrown into the water, each traveling away on its own current.

Filling the Gap In Law Firm Security

It’s no secret that law firms hold a massive amount of confidential client data. And with the dramatic growth and usage of cloud computing, the need to secure the transmission and sharing of this data is becoming more important than ever.

New Big Data Security Guidelines in the Cloud

If you're in retail, ecommerce, finance, insurance, or sales (and the list goes on), you're probably using big data —or you're envious of companies that do. Big data is largely what it sounds like—the process of generating reams of data from customers and clients, and crunching those numbers to uncover hidden trends. Big data is growing at 12.8% per year, and 40% of analytics firms have capitalized on big data already.

How to Achieve Secure Data Sharing with Third Parties

According to a new survey, 34 percent of companies say that up to half of their employees routinely share data with third party organizations, including vendors, partners, customers, and contractors. This has become a dominant trend in the world of businesses, which race towards outsourcing. Non-core functions such as accounting, payroll, manufacturing, and even IT security have all been sloughed off.

10 Ways To Secure Legal Documents

All companies have a responsibility to secure client documents, but the legal professional has an extended ethical obligation. Your legal professional has some of your most personal and business information and they must be diligent with security and securing legal documents.  

How a Cybersecurity Upgrade Can Protect the US Elections

The year 2016 has not been kind to people who worry about cyber attacks. In addition to penetrating the campaigns of both major presidential candidates, attackers tentatively linked to Russia have compromised the state board of elections in two states, stealing two hundred thousand voter records.

How to Overcome Technology M&A Security Risks

While an M&A article published earlier this year says that 2015 was the best-ever year, 2016 is shaping up to be on par with top executives searching for more mergers & acquisitions.

CyberSec News - November 2016

Diverse cyber attacks and motivations continue across the world. In this month's edition of CyberSec News, we will review some of the high profile cyber attacks over the past month and their potential impacts.

Large Scale DDoS Cyber Attack Breaks Internet

Essentially breaking portions of the internet, a massive Distributed Denial of Service (DDoS) cyber attack brought down many high profile company websites such as Twitter, Amazon and PayPal just to name a few, last Friday. Thus, preventing millions of customers from accessing these websites for goods and services for a period of time.

 

Subscribe to Email Updates