How blockchain is impacting information security in companies

Hype surrounding any subject can be either positive, or negative; and at this point in the tech sphere nothing exemplifies this idea more than blockchain. On a positive note, the hype surrounding the decentralized technology is for the most part positive and exciting, being as the tech is considered revolutionary and applicable to virtually all…

Cybersecurity – how confident (complacent?) are you?

Attention all cybersecurity professionals! We all know that today’s cybersecurity landscape is an ever-changing one. So how often should organizations review their cybersecurity strategy? If it’s a question that hasn’t been asked in a while, chances are that in this world of constant threat, you’re probably at risk. For despite the near constant stream of…

Building Upon Trump’s Executive Order on Cybersecurity

Just days after President Trump signed his executive order on cybersecurity, the massive WannaCry attack dominated the news cycle. The assault infiltrated 150 countries, penetrating national networks and infrastructure. A breach of such international scale has rightly raised questions about government preparedness for digital warfare. In answering these concerns, Trump’s executive order should not be…

IKANOW 2.0 Delivers First Customizable Information Security Analytics Platform

Reston, VA — IKANOW today announced the first fully customizable information security analytics platform with enterprise scalability and multi-tenancy. There are many packaged solutions that claim big data analytics capabilities but simply don’t meet the scalability requirements of large enterprises nor do they allow for easy customization that companies need. Built on open sources technologies,…

IF YOU ELIMINATE PHISHING, WILL CYBER RISK DISAPPEAR?

The Verizon DBIR, the Phish Labs’ Phishing Trends & Intelligence Report, and a number of other recent announcements confirm what we all know. Phishing is a popular attack vector. This is an important data point for information security leaders. It also logically leads to two questions: Can you stop phishing to secure your enterprise assets?…