Netizen Blog and News

The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.

Category: Security

  • ALL THE WAYS US GOVERNMENT CYBERSECURITY FALLS FLAT

    DATA BREACHES AND hacks of US government networks, once novel and shocking, have become a problematic fact of life over the last few years. So it makes sense that a cybersecurity analysis released today placed the government at 16 out of 18 in a ranking of industries, ahead of only telecommunications and educations. Healthcare, transportation,…

  • 10 bad habits cybersecurity professionals must break

    Cybersecurity workers face many challenges on the job. Here are 10 bad habits they must avoid in order to be most effective. Demand for cybersecurity professionals continues to rise, with the projected talent gap in the field reaching 1.8 million jobs by 2022. Those that take on these roles play a key role in the…

  • 9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

    Companies and organizations are still struggling to deal with ransomware, a cyberattack in which user data is encrypted and held hostage, supposedly until a ransom is paid. This trend looks set to continue and perhaps even intensify. I often get asked by executive management about what they should be doing and what questions they need…

  • Staying in Front of Cybersecurity Innovation

    Innovation is challenging for security teams because it encompasses two seemingly contradictory ideas: it’s happening too slowly and too quickly. Cyber attackers can launch thousands of attacks daily. Many of these same attackers don’t even need serious technical expertise to do so; they can simply purchase (or even rent) DIY hacking toolkits or subcontract the…

  • Giant Equifax data breach: 143 million people could be affected

    Equifax says a giant cybersecurity breach compromised the personal information of as many as 143 million Americans — almost half the country. Cyber criminals have accessed sensitive information — including names, social security numbers, birth dates, addresses, and the numbers of some driver’s licenses. Additionally, Equifax said that credit card numbers for about 209,000 U.S.…

  • National Science Foundation targets cybersecurity through Triad scholarships

    The National Science Foundation is awarding more than $730,000 in scholarships locally to help tackle the growing concern of cybersecurity. The foundation has awarded $61,000 each to three Forsyth Tech students under its CyberCorps Scholarship for Service program, with a fourth still to be chosen this year. The NSF expects to award four more scholarships…

  • Viewing Cybersecurity From the Consumer’s Perspective

    In recent years, cybersecurity has become a major disrupter across the globe. In a business landscape that depends on digitization and accelerated transactions, cybersecurity is crucial to both providers and consumers. Those consumers must consider cyber resilience when shopping for services or products, even if a vulnerability doesn’t directly affect the device itself. Shifting the…

  • 350% more cybersecurity pros in Washington, D.C., area than rest of U.S.

    Two entrepreneurs place a big bet on cybersecurity startups along the Capital Beltway Silicon Valley is home to the largest population of cybersecurity product companies in the world. Sand Hill Road in Menlo Park, California, is the epicenter of technology (and cybersecurity) venture capital. Scores of venture capital (VC) firms dotting the Bay Area have…

  • Why Is There No Silver Bullet In Cybersecurity?

    In the past two years, companies all over the world spent $157 billion on information security products. For comparison, the total expenses of the state government of New York amounted to $150.7 billion in 2016. Just for our amusement, let’s imagine a silver bullet with a cost comparable to information security expenses. It would weigh…

  • Hacking cybersecurity to anticipate attacks

    Imagine two groups at war. One defends every attack as it comes. The other anticipates threats before they happen. Which is more likely to win? In cybersecurity, understanding the potential for attacks is critical. This is especially true for mobile and wireless devices, since they are constantly connected and continuously streaming and collecting data. “We…