Cyberattacks are growing, but the talent pool of defenders is not keeping pace. Check out this infographic from ISACA. Source: http://cybersecurity.isaca.org The solution is better automation and forensics capability with your hardware. Packet Continuum is your answer.
Bank of America: ‘Safety and security’ will be a $1.5 trillion industry by 2020
The cyber realm has never been more dangerous, and no one is completely immune to the dangers stemming from Russian for-profit hackers, the Chinese government, the Iranian Revolutionary Guards Corps, and transnational organized-crime groups. Safety, and anxieties about safety, is turning into a trillion-dollar industry, with cyber as a major looming threat for government, business, and ordinary consumers. Read the … Read More
Biggest cybersecurity threats in 2016
Headless worms, machine-to-machine attacks, jailbreaking, ghostware and two-faced malware: The language of cybersecurity incites a level of fear that seems appropriate, given all that’s at stake. “Because attackers may circumvent preventative controls, detection and response capabilities are becoming increasingly critical,” advises [research company] Gartner in its report. Read the full article at CNBC: http://www.cnbc.com/2015/12/28/biggest-cybersecurity-threats-in-2016.html Original Author: Harriet Taylor Do you … Read More
Does a data breach really affect your firm’s reputation?
Research and surveys are showing that breaches always impact the bottom line, but if they are managed and responded to adequately, then cost and brand damage can be significantly reduced. Does your business have a incident response plan in place? Read the full article at Network World: http://www.networkworld.com/article/3019930/security/does-a-data-breach-really-affect-your-firm-s-reputation.html Original Author: Doug Drinkwater
The Most Innovative and Damaging Hacks of 2015
In this article from Network World, author Fahmida Y. Rashid covers how the year’s most significant attacks highlight how hackers are changing tactics – and how IT security must evolve in the year ahead. Read More
Cyber risk: The risks to boards of directors and board member obligations
In this article from itGovernance, author Lewis Morgan shows the potential risks to boards of directors and board members with their obligations in ensuring a viable cyber security strategy…Read More
New Site, New Solutions; Packet Capture Redefined!
NextComputing is proud to unveil its new website, entirely dedicated to the packet capture needs of our clients. PacketContinuum.NextComputing.com is your new destination for solutions that detect, analyze, and mitigate network issues and threats to your data. “Free Your Data” is the fitting slogan for Packet Continuum, NextComputing’s innovative, open, massively scalable packet capture solution. Packet Continuum frees you from … Read More
Cybersecurity professionals are the new guardians of digital change
By year-end 2017, more than 20 percent of enterprises will have digital risk services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT). Read More
NSA chief: These are the 3 cyber threats that keep me up at night
Cyber attacks that do infrastructure damage. Data manipulation. Non-state actors. Read More
Hacking Horror Stories and Frightening Facts to make organizations more Security Serious this Halloween
2015 has seen an unprecedented number of hacking horror stories. Yet, while cyber-crime is on the increase, security awareness is still low on people’s list of priorities. We’re hoping our campaign will address this imbalance,” explains Yvonne Eskenzi, the driving force behind Security Serious – a week of workshops and webinars all given for FREE from some of the world’s top cyber-security experts. Read More