Let's Talk
Welcome to the EiQ Networks Blog

Daily Security Briefing -  Friday, April 28, 2017

Posted by Trevan Marden on Apr 28, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Wednesday, April 26, 2017

Posted by Trevan Marden on Apr 26, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Tuesday, April 25, 2017

Posted by Trevan Marden on Apr 25, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Driving Security Accountability through DevSecOps

Posted by John Linkous on Apr 25, 2017

For those of you who have been reading the EiQ Networks blog on a regular basis, you know that one of the most fundamental and unyielding tenets of the security world that we frequently point out is this: functionality and performance always – and we mean always – trump security.  For developers of new software products, hardware technologies and the emerging world of IoT, the ability to get to market as quickly as possible is the most important thing a company can do, because it gets them a market position that turns into revenue.  Because security isn’t generally perceived by companies that make commercial software and hardware as something on which people make buying decisions, it’s usually relegated to a last-minute “bolt-on”, or simply addressed after vulnerabilities are discovered by users and security analysts after the product is released.  Even after disclosure of vulnerabilities, many companies either ignore these findings or back-burner patches and fixes until the next major release of their product.  One of the “dirty little secrets” of the industry is that certain, specific vendors (we won’t name names here… but they know who they are) have had gaping holes in their products for months and sometimes even years.  Sadly, this behavior among many companies is not likely to change.

Daily Security Briefing -  Monday, April 24, 2017

Posted by Trevan Marden on Apr 24, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Friday, April 21, 2017

Posted by Trevan Marden on Apr 21, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Thursday, April 20, 2017

Posted by Trevan Marden on Apr 20, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Wednesday, April 19, 2017

Posted by Trevan Marden on Apr 19, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Daily Security Briefing -  Tuesday, April 18, 2017

Posted by Trevan Marden on Apr 18, 2017

Grab your coffee and read up on today's top information security stories and articles from around the web:

Improving Your Online Privacy in Five Easy Steps

Posted by John Linkous on Apr 18, 2017

Most of us think about information security in terms of what hackers, malware, and other bad actors can do to compromise our systems and data.  And while that’s certainly a critical concern, we sometimes forget about another aspect of information security: protecting our privacy.  The privacy debate is one that has raged for many years.  Today it is often equated with government intrusion, and while this is certainly a legitimate macro-level concern, there are other sinister threats that can be realized when we lose our digital privacy; identity theft, cyberstalking and online bullying, and physical assault due to location disclosure from digital assets (think geolocation inside of devices and geotagging metadata within digital media) are all real-world risks if we don’t protect ourselves.  And while privacy and security are not the same thing, good security definitely improves privacy.

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All