Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • 6 simple & straightforward Cyber Monday fraud prevention tips

    Cyber Monday concept art

    EXECUTIVE SUMMARY: Excited about stocking up on everyday kitchen essentials, epic electronics or must-have fitness gear? On November 28th, Cyber Monday will be the season’s second-major shopping event, second-only to Black Friday, with mega-sales and deep discounts that are accessible from the comfort of your couch. Founded by the National Retail Federation in 2005, Cyber […]

    Source: CyberTalk | Published: Nov 23, 2022
  • One easy way to secure your Android

    Android phone operating system concept art

    Contributed by George Mack, Content Marketing Manager, Check Point Software. The Android operation system has been around for over a decade and has come a long way since then. New features, a wide variety of apps, upgraded camera phones, and an aesthetically pleasing user interface have led to a gigantic install base: A whopping 2.8 […]

    Source: CyberTalk | Published: Nov 23, 2022
  • 27 expert cyber security predictions for 2023 that will help prevent attacks

    Cyber security concept 2023

    EXECUTIVE SUMMARY: In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. Leverage the following expert insights to address cyber security management challenges and to accelerate security program and infrastructure advances. Our expert insights reflect the deep domain expertise that you need in order to enable […]

    Source: CyberTalk | Published: Nov 22, 2022
  • Harris Center ISO perspective: Product evaluation, board engagement & career advice

    Wes Farris, Director of Information Security and Enterprise Architecture

    In this interview, Wes Farris, Information Security Officer for the Harris Center for Mental Health and IDD, discusses how to evaluate the effectiveness of cyber security tools, how to remain in-sync with your board, and keys to cyber security and career success. Did you miss part 1 of this interview? Click here. How do you […]

    Source: CyberTalk | Published: Nov 21, 2022
  • What is purple teaming and why is it useful?

    Startup business concept

    EXECUTIVE SUMMARY: Networks are under attack and in recent years, securing IT networks and data has never presented a greater challenge. With an estimated 6.4 billion fake emails making their way around the world everyday, along with 4,000 ransomware threats, and average data breach costs that soar into the millions, CISOs are constantly preparing security […]

    Source: CyberTalk | Published: Nov 21, 2022
  • A CISO’s 100-day run to cyber success

    Ashwin Ram, Cyber Security Evangelist

    Check Point Software’s cyber security evangelist Ashwin Ram shares a framework and crucial must-do’s to set CISOs up for success in their first 100 days. In today’s climate of widespread data breaches and heightened cyber security threats, the role of a Chief Information Security Officer (CISO), or any executive responsible for cyber resilience, is extremely […]

    Source: CyberTalk | Published: Nov 18, 2022
  • Beware of these Black Friday scams that could spoil your holiday season

    Cyber shopping cart concept art

    EXECUTIVE SUMMARY: Black Friday is almost here and many consumers are eager to bag-a-bargain. An annual occurance on the day after Thanksgiving, Black Friday first began in the U.S. during the 1950s, and has since spread to countries around the world, from Austria to Azerbaijan. Big-ticket appliances, designer clothes, TVs, and toys are deeply discounted […]

    Source: CyberTalk | Published: Nov 17, 2022
  • Ransomware attack on CommonSpirit Health could affect 20 million Americans

    Cyber lock and EKG/EHR concept art

    Hackers are targeting the healthcare industry. Health systems are making progress around cyber security, but a great deal remains to be done. The average breach cost within the healthcare industry adds up to more than $10 million. According to analysts, healthcare tends to lag behind other industries in terms of bolstering cyber threat prevention and […]

    Source: CyberTalk | Published: Nov 17, 2022
  • 6 ways to keep your employees safe online in 2022

    Anas Baig CyberTalk Banner

    By Anas Baig. With the increase in new technologies and remote working, workplace cyber security is more important than ever before. While sharing information with your colleagues online is convenient, it raises safety concerns. One click and all of your precious data and financial information is in the wrong hands. How do you identify these […]

    Source: CyberTalk | Published: Nov 16, 2022
  • 10 secrets for successful digital transformations

    Digital transformation concept art

    EXECUTIVE SUMMARY: Digitize to survive and thrive? Digital transformations account for 40% of all business technology spending, and the digital transformation era is expected continue into 2023. As enterprises become digital-at-scale, building on strategies and investments to meet new demands, drive growth and enhance customer experiences, businesses may wish to appraise how digital transformations are […]

    Source: CyberTalk | Published: Nov 15, 2022
  • The Harris Center for Mental Health & IDD ISO shares perspectives on cyber security

    Wes Farris, ISO, Harris Center for Mental Health and IDD

    Wes Farris is the Director of Information Security and Enterprise Architecture at The Harris Center for Mental Health and IDD, in Houston, TX. Mr. Farris has extensive experience building and maintaining information security programs for healthcare institutions, designing security program technical architectures and operations, and leading information technology risk management and regulatory compliance programs. Wes […]

    Source: CyberTalk | Published: Nov 14, 2022
  • What are eavesdropping attacks? Everything you need to know

    Eavesdropping attack image concept art

    EXECUTIVE SUMMARY: Eavesdropping attacks are easy to execute and exploit inherently insecure or vulnerable networks. Are your network connections weak or insecure? In this article, discovered tried, true and tested eavesdropping prevention measures that can effectively help protect your distributed digital ecosystems. What are eavesdropping attacks? Cyber security-based eavesdropping attacks are distinct from traditional interceptions […]

    Source: CyberTalk | Published: Nov 14, 2022