From Wandera – Analysis: Internet traffic related to coronavirus – the good and the bad
Scammers take advantage of Clorox buying frenzy Analysis: Internet traffic related to coronavirus – the good and the bad Wandera’s Read more.
4 Tips for Securing Your Public Cloud for Remote Work
by Eyal Arazi, Eyal, Product Strategy Manager, Radware When the coronavirus pandemic hit, the worldwide workforce needed to make Read more.
Guest Column: When to Use Software versus Hardware Encryption for Data Storage?
By Richard Kanadjian, Encrypted USB Business Manager of Kingston Technology How businesses store, transport and manage sensitive consumer and company Read more.
The Dark Side of Digital Transformation During COVID-19
By Lizzie Clithroe, Director of Product Marketing at Arkose Labs With continued worldwide restrictions on face-to-face interactions, the COVID-19 health Read more.
Crouching Threat Hunter, Hidden Adversary
By Alex Valdivia, Director of Research at ThreatConnect Many security teams are reasonably proficient at responding to an attack. That Read more.
3 Immediate Fraud Trends to Watch for and How to Fight Back
By Benji Taylor, Senior Director of Service Delivery, Arkose Labs Cybercrime continues to evolve at an alarming rate. To Read more.
Understanding the Challenges of IoT Security
Guest Post By Guillaume Crinon Global IoT Strategy Manager at Avnet Deploying an IoT solution isn’t like putting a product Read more.
From NordVPN: Is our freedom of speech at stake? The most significant laws that will shape the future of the
By Daniel Markuson, digital privacy expert at NordVPN April 6, 2020. 2019 saw some curious laws regarding the internet. Read more.
A Cyber Approach to Coronavirus Containment
What lessons can be learned from reviewing how we manage cybersecurity and applying it to an anti-Coronavirus campaign? In recent Read more.
Guest Column: California’s Consumer Privacy Act (CCPA) to Change How Companies Store Data Nationwide
By Richard Kanadjian, Encrypted USB Technology and Business Manager of Kingston Technology Privacy laws are always changing and getting Read more.
Introduction to Cyber Security
What is cyber security? This introduction to cyber security offers a brief overview of an immense, sprawling subject. Indeed, quite a few books have been written on this subject. It’s impossible to capture it all in a single web page. However, we thought it would be useful to provide a high-level introduction to this topic.
Cyber security is a field of endeavor that spans professions, technologies, processes, laws, law enforcement and national security. At its root, cyber security is about protecting digital assets from harm, theft or malicious, unauthorized use. A digital asset could be a database, a piece of technology like a computer or smartphone, a website, an e-commerce business and so forth.
An introduction to cyber security needs to reference its predecessor. The cyber security field is not new, though it used to be called by (and still is, to some extent) different names. It was known as “information security” (InfoSec). The legal side of it was known as “computer crimes.” The word “cyber” has come into nearly universal use today due to several major shifts that have occurred in the field.
Cyberspace, a concept popularized in science fiction, posits that we (the human users of technology) imagine the invisible, abstract “space” existing between us, our computers, and other computers and their users, as a physical place. It’s fake, but real. Got it? The cyber space has become real enough that it’s a very useful metaphor to describe criminal or malicious acts taking place between people and entities (e.g. governments, corporations) using computers.
We talk about cyber security because life in the modern world has become highly digital. As so many of our interactions and fundamental life processes rely on computers, then crime and malfeasance take place in cyberspace. Hackers are doing much more than affecting InfoSec. They’re affecting people’s lives, in some cases literally, through “cyber physical” acts like hacking connected cars and so forth.
Photo by Engin Akyurt from Pexels