February 27, 2018 Edition
View this email in your browser
What Would a Mobile Workspace Look Like?
What Would a Mobile Workspace Look Like?
What is a mobile workspace? What does it look like, and what are its characteristics? A more fundamental question is: What is the business need? - because that is what will ultimately drive the characteristics of a mobile workspace. 
4 Steps to Harden Your Cloud Environment
According to a recent report from Kaspersky Lab, almost half of enterprises that use the cloud lack a clear understanding of where their data resides and so really don't know if it is secure. Security continues to top the list of concerns for organizations who are migrating more of their applications and data to the cloud.
6 Ways To Make Smart Cities Future-Proof Cybersecurity Cities
Using IoT, analyzing big data, putting services online--all herald the digital transformation of cities. Becoming digital means a new life in the cybersecurity trenches. There is no place like Israel to teach local government leaders how to make their cities and citizens cybersecurity resilient.
5 Reasons That Cryptocurrency Exchanges Are Hacked - And How to Prevent
Bitcoin! Ethereum! Ripple! Do we have your attention yet? Cryptocurrency has become a media darling. A societal fascination with all things vapor-money has blossomed. While the valuation trajectory of digital currencies now smacks of the 17th century Dutch tulip bubble; actually following the speculative rollercoaster is quite the ride.
Why Small Businesses Need Enterprise-Grade Security Just As Much As Large Corporations
In 2017, Verizon's Data Breach Investigation Report revealed 61 percent of all cyberattacks target small businesses. And according to the U.S. Cyber Security Alliance, 60 percent of small business that suffer a cyberattack go out of business within six months. 
Copyright © 2018 Cybersecurity Journal. All Rights Reserved.
280 Hillside Ave, Needham, MA 02494