dcsimg

Top 5 Hacking and Cyber Security Books of 2020

Continuous learning is a top priority for me.  It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and was more interested in the … [Read more...]

A look behind the scenes of a Wi-Fi Hack: What are the secrets?

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite the security risks of free Wi-Fi, 81% of people readily connect What you don’t know is the backpack … [Read more...]

Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story, Ebenezer Scrooge is first visited by the Ghost of Christmas Past. They watch … [Read more...]

Cyber Security Trends and Predictions for 2021, and Reflections on 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued assets people owned second to bitcoin.) The year was likely a gap year for most kids and university students.  The … [Read more...]

Election Protection: How Cyber Criminals Could Steal Your Vote

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for election cyber security. The good news is that The Cybersecurity and Infrastructure Security Agency and the FBI, in a joint statement, said they “have not seen cyber-attacks this year on voter … [Read more...]

Cyber Security and the Future of Connected Devices

Before I take you on a journey to the future of connected devices, let’s briefly reflect on how we got where we are today. During my career, I’m fortunate to have been involved in many exciting technology and digital innovations. It’s important to share some of these with you so you fully understand how amazing technology can be and what an exciting future lies ahead. That said, … [Read more...]

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT department, but the … [Read more...]

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just a technology challenge. It’s a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work and personal life are no longer separate—they have been … [Read more...]

The Impact of the California Consumer Privacy Act on Privileged Access Management

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal privacy law, as it directly impacts 40 million … [Read more...]