Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): What is the Difference?

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

IPS-IDS-Firewall

An Intrusion Prevention System – or an IPS – is a network security technology (and control system) that monitors networks and traffic for any vulnerability exploits or malicious activity. IPS will automatically either allow or deny the detected traffic (good or bad) based on its established ruleset. An Intrusion Detection System – or an IDS … Read more

Endpoint Security – Cutting Through the Complexity With Clear-Cut Requirements

Author(s):

Alex Haynes, CISO, Cheshire Datasystems Ltd.

Endpoint Security

Endpoint security has evolved drastically over the past 10 years. While previously it only referred to ‘anti-virus’ and typically only on workstations, endpoint security has been replaced by a bewildering array of options that can do dozens of things. With the increase in options, we naturally get an increase in complexity, and combine this with … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Sr. Director of Cyber Intelligence Strategy , Anomali

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

DLP Technology – Why Does it Fail?

Author(s):

Alex Haynes, CISO, Cheshire Datasystems Ltd.

DLP Technology

Long ago, before GDPR, there was a class of technology called DLP that claimed to solve all your data leakage and data protection issues.  An acronym that stands for “data loss prevention” (it can also be referred to as “data leakage protection” or “data loss protection,” depending on who you are talking to) was supposed … Read more

The Rise of Cyber-Attacks in the Automotive Industry

Author(s):

Rina Richell, SEO Analytics Manager,

Cyber-Attacks in the Automotive Industry

Losses to the tune of billions are experienced due to the rise of cyber-attacks in the automotive industry, and they are becoming progressively worse as more auto manufacturers join the autonomy space. Industry experts argue that autonomy is the future of the automotive industry, mainly because driverless cars are safer, more comfortable, and more convenient … Read more

Addressing the Gender Diversity Challenge in Cybersecurity

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Address the Gender Diversity Challenge in Cybersecurity - Hire Female Veterans

The global cybersecurity market is expected to grow to $248.26 billion by 2023. The continued growth of cyberthreats creates a robust cybersecurity labor market, and there are over 520,000 unfilled positions in the United States alone. Cybersecurity is a promising career path; however, as is frequently discussed, it lacks gender diversity. Herein lays the question: … Read more

Cybersecurity Facts and Stats

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Facts and Stats - Reasons Why You Should Join the Cybersecurity Industry

Cybersecurity is more than a person behind a screen or hackers in hoodies. Cybersecurity is one of the fastest growing career fields and for good reason: cybersecurity is a universal need. Cybersecurity encompasses everything relating to our data and the protection thereof. Let’s look at some cybersecurity facts and stats and reasons why you should … Read more

HACKERS: THE 411

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Hackers, White Hat, Black Hat, Red Hat, Gray Hat, Hacktivists and Script Kiddies

White Hat, Black Hat, Gray Hat, Hacktivists, we hear all of these names, but what is hacking and who are they? What are the different types of hackers? Why hack? The media has used this term since the 1990’s and it can be traced back further to the late 1980’s. Hacking is the act of … Read more

How Natural Disasters Affect Cybersecurity

Author(s):

Frankie Wallace, ,

Cybersecurity and Natural Disasters

When some management teams think about cybersecurity, often they only concern themselves with proper passwords and the awareness of viruses, not the hacker.  However, to truly protect your business, you need to think about the hackers and what they really are: agents of havoc. They want to trick you with scams and smoke and mirrors, … Read more