MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary Managed Security Service Providers (MSSPs) use specialized software to monitor the environment of companies they provide services for. Security Information Event Management (SIEM) programs provide a platform for MSSPs to manage...

Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security The Payment Card Industry (PCI) Security Standards Council has released a new alert. The alert warns of the threats of online credit card skimming to payment security. Read the full alert or get the highlights...

Return on Security Investment: The Simple Formula [Part 1]

Return on Security Investment: The Simple Formula [Part 1] One can say that the real purpose of Information Security is to preserve value: the value of intellectual property, transactions, access to and dissemination of information, values of commodities and...

Criminal vs. Ethical Hackers: Who Wins?

Criminal vs. Ethical Hackers: Who Wins? When a company is ready to put their infrastructure and applications to the test, they use ethical hackers. These experts look for security gaps in a system. They use frameworks to guide their actions, like OWASP and NIST...

The Public’s Interest in Cybersecurity

The Public’s Interest in Cybersecurity Much like the Internet and the rise of digital technology, cybersecurity has been a growing interest area for the past decades. A proxy to track public interest in concepts, people or anything is search queries. Google...