Email remains the main communication tool for businesses. If an email account is hacked it can allow the attacker access to the personal, sensitive, or confidential information in the mail storage; as well as allowing them to read new incoming and outgoing email and to send and receive as the legitimate owner. With advances in medicine to advances in space, why can we not … [Read more...] about Why are we still at risk from email hacking?
Cybersecurity Is Not Just About The Tech
|Cybersecurity may well be the most important function in the modern world. Without it, nothing else can be trusted, in any sector of the economy.|
|Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.|
|We also need to draw your attention to the higher order concept of Cyber War. This is, unfortunately, something all technologists should be familiar with now. The most critical piece to read on that topic now is Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases followed by: Main Street Cybersecurity: Can Email Be Safe? and Time for Transformational Cybersecurity!|
Stay In The Loop: Sign Up To Receive Daily, Weekly or Monthly Newsletters including the Cybersecurity and Cyerwar Weeklys
When it it time to research the great providers of Cybersecurity Solutions, kick off your search in the CTOvision Disruptive Technology Finder. Pay particular attention to the sections on Cybersecurity, CASB, Cyber Threat Intelligence, and VPN.
|For help putting all this information into context for your business, consider tapping into Crucial Point's CTO-as-a-Service or Technology Due Diligence offerings, both are ways to quickly leverage the technical talents of experienced enterprise technology professionals.|
More on Cyberwar and Cybersecurity:
Iran’s Hacker Hierarchy Exposed: The Islamic Republic of Iran Makes Maximum Use of Contractors and Universities to Conduct Cyber Operations
Google+ may be a punchline in the social network world, but there’s something seriously wrong with it. For the second time in as many months, Google has announced that Google+ has been hit with another data leak, and this one is way worse than the last. According to a blog post, some 52.5 million users are affected by this latest data breach, 100X more users than the 500,000 … [Read more...] about After another massive Google+ data breach, you should probably delete your profile right now
Are you technical and do you manage engineers? Want to learn the latest tips and tricks for building and managing engineering teams from top venture backed CTOs? On Tuesday December 18th, at the Nasdaq Marketsite in Times Square, learn from speakers including the CTOs of MongoDB, Meetup, Greenhouse, Grubhub, Mode Analytics and 2U and senior engineering leaders from Shopify, … [Read more...] about CTO Summit at NASDAQ Marketsite in Times Square 18 Dec 2018
Maybe at this point this is stating the obvious. But interesting that this still has to be said. Small and medium businesses need to take more action regarding cybersecurity. Read why Pankit Desai says that small and medium enterprises have to shore up their cybersecurity on Entrepreneur : Cyber insecurity is no longer just a buzzword, it has become a reality for Small and … [Read more...] about SMEs: Small in Business, But Need To Get Big on Cybersecurity
Kubernetes has become the most popular cloud container orchestration system by far, so it was only a matter of time until its first major security hole was discovered. And the bug, CVE-2018-1002105, aka the Kubernetes privilege escalation flaw, is a doozy. It's a CVSS 9.8 critical security hole. With a specially crafted network request, any user can establish a connection … [Read more...] about Hacking The Cloud: Kubernetes’ first major security hole discovered