Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

Cybersecurity: A game of cat and mouse

Cybersecurity: A game of cat and mouse

For many years, cybersecurity has been a key priority for organisations. However, even with increased investments and advancements in technology, cybersecurity looks to remain a cat and mouse game.

Arabian Business October 11, 2021
Why are there So Few Women in Cybersecurity?

Why are there So Few Women in Cybersecurity?

The stepping stones for women in cybersecurity date back to the 1940s, when the computer industry was still in its nascent stage. Brave women dubbed as ‘code girls’ worked secretly in wartime intelligence during the World War II breaking codes for the Army and Navy. These women were the precursors of what we now call women in cybersecurity.

CXO Today October 5, 2021
Cybersecurity Training Trends 2021

Cybersecurity Training Trends 2021

Cybersecurity training trends reflect the urgent need for organizations of all sizes to harden their infrastructure against increasing external and internal attacks. In 2020, some 37 billion records were compromised in nearly 4,000 reported data breaches, according to RiskBased Security’s 2020 Year End Data Breach QuickView Report.

Datamation September 27, 2021
Report: Fostering a diverse cybersecurity workforce

Report: Fostering a diverse cybersecurity workforce

The range of backgrounds and experiences among the workforce directly impacts the mission in cybersecurity, experts said during an event focused on the diversity of the cybersecurity workforce hosted by the Aspen Institute’s Tech Policy Hub and Aspen Digital on Sept. 9.

FCW September 13, 2021
The growing cybersecurity menace that is Droppers-as-a-Service

The growing cybersecurity menace that is Droppers-as-a-Service

Droppers for hire are delivering bundles of malicious and unwanted content to targets looking for cracked versions of popular business and consumer applications, according to new research from Sophos.

Security Brief September 6, 2021
Failing to Meet Cybersecurity Standards Can Have Legal Consequences for Companies

Failing to Meet Cybersecurity Standards Can Have Legal Consequences for Companies

Cybercrime is one of the most significant threats facing companies today. With the average cost of a data breach reaching an all-time high of $4.24 million, the business case for cybersecurity has never been stronger. Still, some businesses seem to misunderstand the urgency of meeting current cybersecurity standards.

Trip Wire September 1, 2021
Why Space Is The Next Frontier For Cybersecurity

Why Space Is The Next Frontier For Cybersecurity

With projects like Blue Origin and SpaceX, private-sector innovators like Jeff Bezos and Elon Musk are pursuing outer space endeavors at seemingly breakneck speed.

Forbes August 24, 2021
How Did the Cybersecurity Ecosystem Get So Clogged Up?

How Did the Cybersecurity Ecosystem Get So Clogged Up?

Today’s enterprise operations involve the coordination of several different digital ecosystems but none quite so inflamed as the cybersecurity ecosystem. Technology has been evolving at a rapid pace, and attackers are armed with advanced tactics to steal data and expose secure information.

Trip Wire August 17, 2021
Most Employees Took Cybersecurity Shortcuts During the Remote Working Period Despite Understanding the Risks

Most Employees Took Cybersecurity Shortcuts During the Remote Working Period Despite Understanding the Risks

A report on employee cybersecurity practices found that most workers took cybersecurity shortcuts despite knowing the risks involved.

CPO Magazine August 9, 2021
5 Cybersecurity Tactics To Protect The Cloud

5 Cybersecurity Tactics To Protect The Cloud

Cybersecurity and risk management have moved on top of the boardroom agenda. According to a Gartner survey 61 percent of chief information officers (CIOs) are increasing their investment in cyber and information security.

Forbes August 2, 2021
Don’t Let False Positives Sink Your Cybersecurity Strategy

Don’t Let False Positives Sink Your Cybersecurity Strategy

When you think about the must-have capabilities for organizational cybersecurity, spotting attacks and rapidly taking action to prevent them is at the top of the list. It’s almost as important, though, to pay attention to the flip-side of that proposition — and ensure your cybersecurity tools are able to identify risky behavior without flagging harmless activity as potentially malicious.

CPO July 27, 2021
These Are the Most In-demand Cybersecurity Careers You Should Go For in the Next 5 Years

These Are the Most In-demand Cybersecurity Careers You Should Go For in the Next 5 Years

Getting a career in information technology (IT) sector is generally something that can ensure that you would always have some kind of gainful employment that you can end up relying on, and the good news here is that you can always figure out which field would be the best for you to enter based on how fast it is growing.

Digital Information World July 20, 2021
Cybersecurity Is A Culture, Not A Product

Cybersecurity Is A Culture, Not A Product

In my decades of cybersecurity and business leadership, I found several truths to be self-evident. When it comes to managing a successful business, a variety of stakeholders have certain expectations.

Forbes June 30, 2021
Consumer cybersecurity awareness still low, businesses should step up – IBM Security

Consumer cybersecurity awareness still low, businesses should step up – IBM Security

Cybersecurity awareness by global consumers is still concerningly low, according to a new survey by IBM Security. This trend will greatly impact businesses relying on digital engagement to consider how this will affect their cybersecurity risk profiles.

Tech Wire June 30, 2021
Cybersecurity Post Covid-19: The Opportunity For A Safer Cyber Future

Cybersecurity Post Covid-19: The Opportunity For A Safer Cyber Future

That is according to a survey by Risk Based Security, which found that the number of records exposed reached a staggering 36 billion in the first three quarters of 2020 alone. The most exposed data types included access credentials in the form of email addresses and passwords.

Analytics Insight June 21, 2021