Before you buy or connect a smart device (IoT), read this!

Posted by:

The Internet of Things (IoT), as a term, has been bandied around a lot over the last few years.

Many people – even those that work in the technology sector – are still unclear on what IoT really means.

In this blog series, we will define IoT, talk about why infosecurity experts are concerned, and delve into some of the issues facing both providers and consumers.

We’ll also provide some practical recommendations for both parties:

  • Consumers of IoT devices: Tips for choosing the right IoT ...
Read More →
1

Trump’s budget blueprint: what’s it mean for cybersecurity?

Posted by:

Last week, we saw the release of the US’s 2018 budget blueprint.

Before I even read the document, I did a random search on some security-related keywords within the 2018 budget to see how many times each one showed up. I found the results rather revealing. Make of this what you will:

  • Cyber: 15
  • Security: 68 (5 of which refer to Homeland Security)
  • Attack: 4
  • Privacy: ...
Read More →
0

Want to be a cybersecurity hero this holiday? Here’s how.

Posted by:

Ahhh December 2016. It is that time of year again. Christmas and other holiday celebrations are just days and weeks away.

However you celebrate, whether you are planning the festive feast, travelling to a far-flung location, or madly getting your gifts ready, you’re likely to be with others: your family, your pals, your in-laws, your friends or work associates.

So we have a proposal for all you IT security-savvy types out there…Join TBG Security’s

IT Security Holiday Lock Down

Here is our ...

Read More →
0

Offensive Security Unbound: introducing Red Team Service

Posted by:

With new cyber threats exploding into existence and commandeering what we would normally consider to be well-defended networks, our concern was straight-forward: how do we provide more effective security measures for our TBG Security customers?

We decided to get down to brass tacks to figure out how we could elevate IT security to the next level.

Instead of offering spot checks at set times, what if TBG Security set up a team of accredited security professionals that could use the methods an ...

Read More →
0

Incident Response: Looking Beyond the Breach

Posted by:

data breach response

When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation. Until recently, however, Schneier’s name wouldn’t be on most people’s list of incident response experts.

Schneier’s reputation, after all, was built on his keen observations of the influence of IT security ...

Read More →
0

Solving Cloud Security Will Open Adoption Floodgates

Posted by:

cloud security solutionI don’t know about you but there are a couple of additional barriers to Cloud solutions that are likely to prevent rapid adoption.  However, we would agree with Steve Wexler, it’s a big barrier.

Would your company be more likely to implement a Cloud solution if you knew it was secure? More importantly, what proof would be adequate to persuade you to ...

Read More →
0
})
SEC Cybersecurity Exams