Learning Everything about Cybersecurity Law and Homeland Security

This is a sponsored post written by me on behalf of University of Maryland Carey School of Law. All opinions

Read more

One New Year’s Resolution Meets IT Challenges of 2017

Happy New Year everyone. Here’s to hoping you’re all ready to tackle the challenges 2017 has in store. This is

Read more

Kristin Montag: 4 Approaches to Mobile App Management [Video]

Managing apps and managing what they are allowed to do, is not only relevant in large enterprises anymore. Even for

Read more

Secucloud Offers Personal Cybersecurity in the Age of IoT

German cybersecurity startup Secucloud, hailing from Hamburg, has successfully completed their third crowdfunding seeding project in April. Their solutions are

Read more

The Role of Cybersecurity in Brazil’s WhatsApp Ban

Cybersecurity has been a constant topic in recent news, with recent incidents including the San Bernardino Apple-FBI battle and Romanian

Read more

Hortonworks Provides Open Data Solution for Cybersecurity Operations

On the 12th of April Hortonworks announced to put a strategic focus on open cybersecurity and talked about the solution

Read more

Enterprise YOLO and Working Like You Don’t Give a Damn

In this article we are going to analyze the YOLO (You Only Live Once) lifestyle and find out if this

Read more

Mobile Cyber Security: Minimizing Loss and Maximizing Profit

According to the Symantec Internet Security Report, the known number of times that computer security is penetrated is 34,529… per

Read more

Digital Forensics and Cyber Security Recruitment Firm Going Global

Digital Forensics Global Recruitment is one of the major recruitment firms that focuses on niches, and that on its own

Read more

Methodologies for IT Service Management and Project Management

I’m a big fan of standard practices, common ground and professional methodologies, that help me to help organizations achieving their

Read more

RESILIA: When InfoSec Meets ITSM

I have recently completed an online course at the University of Adelaide that was named ‘Cyberwar, Surveillance and Security’. I

Read more