Cyber security market to hit $101bn in 3 years

Cyber security market to hit $101bn in 3 years

  The worldwide cybersecurity market is expected to reach $101 billion by 2018 as cyber security is becoming complex day-by-day with cyber criminals trying different …

Read More
While the US Army Sharpens Its Cyber Defenses, the Navy Faces the ‘Real’ Deal Right Now

While the US Army Sharpens Its Cyber Defenses, the Navy Faces the ‘Real’ Deal Right Now

U.S. Fleet Cyber Command conducts ‘real world operations because they’re there, and we don’t have a choice’ while the Army’s Cyber Command is cautiously getting …

Read More
If You Fall for a Phishing Scam Should You Lose Your Security Clearance?

If You Fall for a Phishing Scam Should You Lose Your Security Clearance?

If you fall for a phishing scam, should you lose your security clearance?  Find out what one government CISO recommended at the 6th Annual Billington …

Read More
Highlights: 6th Annual Billington Cybersecurity Summit

Highlights: 6th Annual Billington Cybersecurity Summit

Attendees at the 6th Annual Billington Cybersecurity Summit Sept. 17 heard from government, military and private sector cyber leaders on the threats and opportunities in …

Read More
Cybersecurity’s Human Factor: Lessons from the Pentagon
Michael Byers

Cybersecurity’s Human Factor: Lessons from the Pentagon

The vast majority of companies are more exposed to cyberattacks than they have to be. To close the gaps in their security, CEOs can take …

Read More
Healthcare is the Holy Grail for Many Hackers

Healthcare is the Holy Grail for Many Hackers

A data treasure-trove containing often both financial and healthcare data resides in healthcare organizations, making them prime targets for hackers, nation states and other malicious …

Read More
Legacy Systems is Core Underlying Problem in Massive OPM Breach
Mike Levine

Legacy Systems is Core Underlying Problem in Massive OPM Breach

You hear a lot these days of the reaction to the OPM hack involving the “Cybersecurity Sprint,” the need for two factor authentication, etc. Yet …

Read More