Stay on the cutting edge of cybersecurity's evolution and global insight! Subscribe to The Nexus for FREE today!

Cloud Insecurity: The Need for Stronger Identity Management

By Mark B. Cooper

The Nexus  |  10 Sep 2018

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions? More than 80% of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report,1 begging...

Combatting “Fileless” Malware

By Ed Moyle

The Nexus  |  13 Aug 2018

If you are a security practitioner, you do not need me to tell you how bad malware is. We all have war stories of critical system outages, angry users and other disruptions to the well-oiled machinery of our enterprise’s technology that occurred because of a particularly nefarious malware...

Overexposed and Underprepared: Top Reasons to Consider SIEM Now

By Tyler Hardison, CISSP, PCI Qualified Security Assessor

The Nexus  |  09 Jul 2018

Who are the biggest targets for hackers and cybercriminals? You are. Intruders are finding the holes in your network, your devices, your applications—and they are accessing your data. The majority of organizations do not have the security resources or the required security solutions in place for...

Boost Security in Your Organization with Tactical Two-Factor Authentication

By Mark B. Cooper

The Nexus  |  09 Jul 2018

Social engineering is on the rise. Organizations are nearly 3 times more likely to get breached by social attacks than via actual vulnerabilities, according to Verizon’s 2018 Data Breach Investigations Report.1 With the increased awareness of social engineering attacks, it is time for...