Cybersecurity Acronyms – A Practical Glossary

Author(s):

Lauren Abshire, Editor, United States Cybersecurity Magazine

Cybersecurity Acronyms

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having dual meanings – think IP address and IP for Intellectual Property – and some acronyms having very slight differences. Here, … Read more

,

Companies Must Prepare for Escalating Ransomware Attacks and Threats

Author(s):

Noman Ansari, Senior Writer, Malwarebytes

Ransomware Attacks - Cybersecurity Software

There certainly have been some dangerous ransomware attacks in the recent past. In 2017, the WannaCry ransomware attack exploited a security flaw in Microsoft Windows OS to hold over 200,000 computers hostage worldwide. The hospitals that were struck by WannaCry had to cancel essential procedures, including emergency services. After postponing thousands of appointments, the costs … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Sr. Director of Cyber Intelligence Strategy , Anomali

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

Ransomware: Harbinger of the Future

Author(s):

Scott Blough | Associate Professor of Criminal Justice & Security Studies at Tiffin University, ,

Ransomware

The recent spate of ransomware attacks on Texas municipalities is a harbinger for the future of cyber-crime. In fact, according to various news sources, as of August 23rd, 2019, at least 22 municipalities in Texas have been affected by this recent ransomware outbreak. Although not all of those affected have gone public, there have been … Read more

5 Cyber Threats You Should Be Aware Of

Author(s):

Emma Megan, ,

A data breach can hit any business at any time. Whether it is sensitive information that the company must protect to maintain its competitive advantage or documents necessary to meet industrial or government’s regulatory requirements, all data must be protected. The fallout of a data breach has a significant impact on any business. Data breaches may include … Read more

Why Software Architecture Matters in Foolproof Cybersecurity

Author(s):

Judy Robinson, ,

Software Architecture

The long-term success of any business or digital venture depends solely on a strong software architecture – one that has robust performance and is equipped with foolproof cybersecurity. In simpler terms, software architecture forms the basis of the development of an enterprise. Therefore, the main source acts as a guideline to shape the future of … Read more

Denial of Service: Access Denied

Author(s):

Patrick Putman, ,

Denial of Service, girl at laptop, access denied

As an internet user, you have likely experienced an interruption in service at some point. Maybe your favorite website was unavailable. Or perhaps your internet service was completely down. Sometimes this happens due to scheduled maintenance. Other times it happens due to hardware or software issues. However, interruptions are occasionally the result of what is … Read more

Why Data Security Has Become a Priority for Healthcare Professionals

Author(s):

Frankie Wallace, ,

healthcare

The healthcare industry has been particularly vulnerable to cybersecurity risks. The biggest data breaches in 2018 involved email, phishing attacks, and the misconfiguration of databases. One attack even lasted longer than a year. With so much patient data in the healthcare system, it’s becoming increasingly important to improve data security. There are a variety of … Read more

A Brief and Incomplete History of Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity History, evolved, evolution of man, blue men, computer, cyber

Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents that took place before computers, but for the purposes of this article, our timeline starts in 1971, with an experiment. … Read more