Archive for August, 2018

Aug 30, 2018




Medicine and Cybersecurity, Is It Only About Viruses? A Cyber Vaccine In medicine, vaccines are used to prepare the body to attack viruses and treat illnesses. Pharmaceutical companies do not develop, trial, and release vaccines for a single patient, rather opting for strains of diseases to treat. The time, effort, and resources in developing cures […]

The Not So Small or Medium-Sized Threat to SMBs A new year has arrived. It’s 2019 and employees from Efficient Services Escrow Group are recollecting the previous weeks’ still-palpable holiday cheer. But, as the firm’s accountants review its December transactions, they see an anomaly a few short days before Christmas… something has gone horribly wrong. […]

No Thank You Very Much, Mr. Roboto Spammer and Robocall Tactics Even Practitioners Fall For Tell me if this sounds familiar: your phone rings unexpectedly and it’s an unknown number from the same area code as your personal number. You debate whether to answer knowing it’s probably a scammer, but curiosity kicks in and you […]

Why Your Best Cyber Talent is Going to Leave You According to a 2017 survey by ISSA and ESG, nearly half (49%) of cybersecurity practitioners are solicited for a job opportunity at least once a week. Stretching that out to a monthly range, almost every cybersecurity employee is presented with at least one opportunity to […]

QTNA: How to Pronounce CISO In CyberVista’s Questions That Need Answers (QTNA) video series, we tackle some of the most testable and important cybersecurity questions on a weekly basis. This week we’re following up from our time at Black Hat 2018 where we asked folks a much debated question in cybersecurity. Here we go…

California’s Consumer Privacy Act The California State Legislature has passed A.B. 375 otherwise known as the California Consumer Privacy Act (CCPA) which grants consumers sweeping protections for consumers’ personal online data. The Act, set to go into effect on January 1, 2020, will grant all California residents increased ownership, control, and security when it comes […]

A Tale of Two Crowns: Prioritizing and Protecting Your Most Important Assets    It was a scene that could have come straight out of a heist movie. Last Tuesday, August 2, two burglars broke into a cathedral near Stockholm and stole several of Sweden’s famous crown jewels. The thieves smashed a security case, snatched the […]

Loading posts...
Sort Gallery
Enter your email here