Why CISOs Should Embrace Personalized Cybersecurity Training

Author(s):

Asaf Kotsel, Co-Founder and CEO, Dcoya

CSAT

One of the most urgent responsibilities for any CISO is generating support for Cybersecurity Awareness Training (CSAT) across the organization. An effective cybersecurity strategy requires comprehensive stakeholder buy-in, as data breaches can be caused by anyone – from executives to entry-level employees. CISOs also need the support of their colleagues in the C-Suite and at … Read more

Virtualization Is Transforming Mobile Security Research: Here’s How

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile Security

The Internet of Things (IoT) is taking mobile security research by storm. According to market research firm Statista, the number of IoT devices worldwide is forecast to include more than 29 billion IoT devices by 2030. Consumer internet and media devices like smartphones and smartwatches are expected to make up 17 billion of these devices, … Read more

Pirated Software Presents New Cybersecurity Risks for Small-Business Owners

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Pirated Software

Although using unlicensed or pirated business software is illegal, many companies still get away with it. According to the latest Global Software Survey conducted by the Business Software Alliance (BSA), approximately 37% of all software worldwide is unlicensed and technically illegal. The continued practice of software piracy might not always result in legal repercussions, but … Read more

Accounting for Cybersecurity Risks in the U.S. Transport Industry

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Transportation Industry Security Risks

The world has become increasingly interconnected through technology. Many countries rely on their transportation systems to deliver goods domestically and overseas. Cybercriminals understand the necessity and exploit it for their gain. The past few years have seen the transportation industry come under attack from cybertheft. Technology has enhanced protection, but many organizations still face threats. … Read more