INTERFACE Seattle 2025

Author(s):

Join Us on December 11, 2025 | 8:30 AM – 4:30 PM (PST) Seattle Convention Center, Ballroom 6BC 705 Pike Street Seattle, Washington IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and … Read more

6 Data-Backed Predictions for Cybersecurity in 2023

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Cybersecurity in 2023

Changes in technology happen rapidly. Innovations emerge as people and companies conduct business every day. Tech can be a significant benefit or a detriment when cybercriminals take advantage of innocent people and attack their vulnerabilities. These attacks are likely to continue, but there are means of mitigation. With that in mind, here are six data-backed … Read more

Benefits of Using Cloud Security Posture Management (CSPM)

Author(s):

Erik Kaminski, Author,

Cloud Security Posture Management

Cloud computing has been revolutionizing the IT industry in the last couple of years. As a relatively new technology, cloud computing has changed the way both companies and individuals go about handling the required resources. Namely, the cloud is often cheaper, faster, and more reliable than an on-premise environment, which is why cloud technology is … Read more

Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know

Author(s):

Joseph Carson, Chief Security Scientist & Advisory CISO, Delinea

PAM as a service is a robust solution that can address the challenges of hybrid cloud security.

For a growing number of companies, a blend of public cloud services, private clouds, and on-premises infrastructure offer the best solution to the benefits and limitations of each. Cloud adoption is growing, and the past two years have shown a major increase in the use of cloud services. In addition, emerging technologies like edge computing … Read more

How Can Organizations Prioritize Data Privacy Through Encryption?

Author(s):

Waqas S, Cybersecurity Journalist, DontSpoof

Data Privacy - Encryption

Rapid technological advancements have transcended data in value, making it highly significant to individuals and organizations. With that being said, despite the many regulations protecting data rights, such as the General Data Protection Regulation (GDPR), the Data Protection Act (DPA), and the Health Insurance Portability and Accountability Act (HIPAA), there are still multiple threats to … Read more

The Importance of Protected Digital Assets

Author(s):

Frankie Wallace, ,

Digital Assets

A significant number of your digital assets, whether personal or professional, are now digital in this current age. The transfer of business practices, records, and even storefronts from a mostly physical world to a digital plain has developed rapidly over the last couple decades. Because of this, we are increasingly concerned about the security of … Read more

Top 10 Cybersecurity Risks For 2019

Author(s):

Duncan Kingori, ,

2019 Cyber Risk Man Assessing Servers Blue Illustration Password

2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally being addressed due to the intensity and volume of attacks. 2019 is a fresh year and you can be sure … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

Malicious Software- What About It?

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…