Online shopping will continue to dominate the way shoppers procure gifts for friends, family and the like this holiday season. According to data from Salesforce, e-Commerce revenue is expected to grow 13 percent in 2018 over the previous year with mobile devices accounting for 46 percent of purchases, 44 percent on desktop computers and nine percent for tablets.
Full Article

Security firms are warning consumers about an uptick in holiday cyber threats, cautioning online shoppers to watch which sites and links they click on during the upcoming holiday season. While cyber crime normally spikes during the holidays, particularly as more Americans choose to buy from online retailers, researchers from several prominent security firms are flagging new tactics that could come up this season.

Full Article

Black Friday and Cyber Monday are at hand, which means retailers have been working extra hard behind the scenes to ensure their websites and security-savvy customers are well-protected from the cyber Grinches. Indeed, 50% of 2,011 US consumers recently surveyed by Sophos said they are very concerned about getting hacked and would not buy from a retailer that has been in the news for not protecting personal information either online or in-store. Another 32% said they are somewhat concerned and would consider an alternative company to buy from instead.

Full Article
Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019.
Full Article
The Chertoff Group Supports Opperation Renewed Hope (ORHF) and Organizes a Day of Service to Benefit the Foundation
Full Article
Following the Pittsburgh Synagogue shooting, Chertoff Group CEO Chad Sweet analyzes how advancements in prevention and detection technology can prevent loss of life.
Full Article
In late July, the U.S. Department of Homeland Security announced the establishment of a new National Risk Management Center to “provide a centralized home for collaborative, sector-specific and cross-sector risk management efforts to better protect critical infrastructure.”  The announcement underscores the need for greater focus and attention on disciplined risk management in defending critical infrastructure against an increasingly adaptive set of security threats.
Full Article

THE DRONE THREAT IS REAL. THE SOLUTION IS COMPLEX.

In August, Venezuelan President Nicholas Maduro claimed he was the target of a drone-borne explosive assassination attempt. While some sources assert that the entire episode may have been staged to assist Maduro in consolidating power in distressed Venezuela, the incident highlights the challenges of defending against and mitigating drone threats. The United States has experienced our own less nefarious drone incidents, including one that occurred in 2015 at the White House. Although it garnered less notoriety than the Maduro incident, a drone carrying de-activated grenades, and likely flown by an organized cartel, targeted a police chief in Baja Mexico in June of this year. These incidents bring to the forefront an issue that security professionals and governments have been struggling with since the introduction of inexpensive, and readily available, commercialized unmanned aircraft systems (UAS) or “drones” — how to identify, classify, and defend against one or many hostile drones?

Full Article
Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes.
 

Effective cybersecurity is becoming a tougher problem as organizations embrace more types of devices and hardware. Protecting organizations requires more than tools, which companies tend to learn the hard way. Granted, as the technology stack changes, new cybersecurity tools become necessary. However, the problem has become so complex that no organization can afford all the tools, all the people, and all of the other resources it would need to protect itself against everything.

Full Article
There is, or ought to be, common ground in the encryption debate. It is time to put aside the past and move forward toward a wiser encryption policy.
Full Article
Schedule a Consultation

Contact us today to learn what we can do for you.

Schedule a Consultation