cybersec

The Intelligence and Cybersecurity Diversity Fellowship Nov. Recruitment Roundtable (November 14, 2024 1:00pm)

Event Begins: Thursday, November 14, 2024 1:00pm
Location:
Organized By: University Career Center


Are you looking for a summer job? Are you interested in working for one of the largest Federal Government Agencies? Well, look no further. The Intelligence and Cybersecurity Diversity Fellowship (ICDF) Program is an opportunity for current college students attending an institution of higher education, including Historically Black Colleges and Universities (HBCUs) and Minority Serving Institutes (MSIs) who are majoring in Intelligence and/or Cybersecurity-related areas of study. In this program, students may receive:• A paid fellowship• First-hand, practical experience in Intelligence and Cybersecurity disciplines• Participation in high-priority challenge projects• Training in core and technical competencies• Advice and support from mentors• Networking opportunities• Tuition assistance (if available) If you’re interested in learning more about the ICDFProgram, please join us for a recruitment roundtable on Thursday, November 14th at 1:00 pm EDT.




cybersec

OSCE and Azerbaijan discuss cybersecurity

BAKU, 13 April 2015 - The OSCE Project Co-ordinator in Baku and Azerbaijani Foreign Ministry organized a two-day conference on ensuring national security in the information age, which brought together more than 80 representatives from more than 30 government and private organizations in Azerbaijan as well as international experts on cybersecurity.

The conference aims at raising awareness within the government, private and non-profit sectors about new developments in the sphere of cybersecurity with special emphasis on legislation, policy framework, international co-operation and overall capacity development for the security of cyberspace.

“The rapid economic development that Azerbaijan is enjoying, accompanied by the modernization of infrastructure and permeation of information technologies throughout the public and private sectors, reinforces the need for developing the capacity for preventing and countering cyber-crimes in Azerbaijan,” said Ambassador Alexis Chahtahtinsky, OSCE Project Co-ordinator in Baku. “In our efforts to effectively address all possible threats, we have to ensure that we do not overreact and sacrifice the benefits that a functioning cyberspace brings to society as a whole.”

During the conference, renowned experts and practitioners shared with Azerbaijani colleagues the best international practices in cybersecurity. The panel discussions provided an opportunity to develop the operational and technical knowledge of prosecutors, judges and law enforcement officers. They also opened avenues for officials to develop partnerships with the private sector in order to increase the capacity of Azerbaijan for cybersecurity.

This event is part of a project by the OSCE Project Co-ordinator in Baku on preventing and countering cybercrimes in Azerbaijan. The project is being implemented in co-operation with the Ministries of Foreign Affairs, National Security, Justice as well as Communications and High Technologies.

Related Stories




cybersec

Cybersecurity Best Practices for Small Businesses

With every passing week comes a story about some technological snafu at big companies—and even in the government. But small businesses are very vulnerable to cybersecurity issues, both because they lack the resources of big enterprises and because their lack of resources means that an attack can be even more devastating.

Here are some best practices that small businesses can put into place to make sure that they are secure.

complete article




cybersec

Small Business Trends In 2016 Mean Greater Cybersecurity

With the economy in a recession, business growth is more necessary than ever in order for businesses to survive. Since most businesses are small businesses, it is important to understand the latest small business trends and then use those trends to grow. The current projections for small business is that they will continue to grow throughout 2016.

complete article




cybersec

How to Improve Your Small Business Cybersecurity in an Hour

Statistics show that cybersecurity is a legitimate threat to small businesses, but small businesses don't always act on that knowledge. According to the 2018 Small Business Cybersecurity Report, 47% of small businesses experienced an attack in the past 12 months. Cybersecurity is a serious concern, yet the report shows only 52% of businesses have a cybersecurity strategy.

complete article




cybersec

Can Too Much Cybersecurity Be Bad for Your Small Business?

If you run a small business, security is probably near the top of your priority list—and if it’s not, it should be. Businesses are the most common targets for cyberattacks, and the consequences of having data stolen can be huge ever since the passage, implementation, and consequences of the GDPR (General Data Protection Regulation) in Europe.

complete article




cybersec

Cybersecurity for small business

While cyberattacks facing large corporations and government entities may dominate headlines, small businesses are victim to the majority of cybersecurity breaches. In fact, nearly half of small businesses in the United States suffered a cyberattack in 2017, according to a recent study.

Cybersecurity attacks are constantly evolving to accommodate the latest technologies. Small businesses contend with several existing and emerging internet-related threats, including malware, ransomware, phishing and botnet infections.

complete article




cybersec

Your Cybersecurity Spring-Cleaning Checklist

For small business owners, tidying up your digital space means conducting a virtual sweep of your website and organizations security practices. I recommend that small business owners use the following cybersecurity spring cleaning checklist to ensure they don't miss any important items.

Spring Clean Your Website
The first step of cybersecurity spring cleaning is to deep clean your business website. By clearing out what you do not need, you can improve the overall health of your site.

Start with decluttering plugins and software. You should only keep the ones you're using and delete the rest to reduce your sites cybersecurity risk.

After you remove any plugins and software you are not using, make sure the ones you keep are updated. In addition, continue to proactively monitor your plugins and software on a regular basis and check for security updates.

It's also the perfect time to take a closer look at the data you're gathering from customers. Ask yourself if you are collecting information that truly benefits your business, such as information that drives value for marketing, sales, and services. If the type of information you collect has changed over time, delete any data and applications you're no longer using such as analytics code, remarketing snippets, affiliate tracking, and CRM tracking.




cybersec

60% of Small Businesses Do Not Have a Cybersecurity Policy: Survey

Social distancing amid COVID-19 has forced millions of businesses to set up remote workstations that rely solely on Web applications and services (SaaS) to conduct business operations.  According to a new survey by the Cyber Readiness Institute (CRI), the virtual workplace has increased cybersecurity concerns for small business owners, as most of them have not implemented remote working policies to address cybersecurity threats.

The survey, which included 412 small business owners, revealed that while most small business owners are concerned about cyberattacks, many  lack the resources to invest in necessary security measures – and  half of them are worried that remote work will lead to more cyberattacks. It revealed that only 40% of small businesses have implemented a cybersecurity policy. Around 40% of businesses stated that economic uncertainty prevents them from making security investments. While 46% have offered training to help their employees stay secure while working remotely.

Nearly 51% of business owners surveyed said they provided employees with technologies to improve cybersecurity for remote work. And 55% of them said they believe federal and state governments should provide funding for cybersecurity products and services.




cybersec

6 Cybersecurity Must-Haves for Your Business

In the current environment, cybersecurity is essential for businesses of all sizes. Many small or medium-sized businesses find themselves without adequate cybersecurity, either as a result of believing that they don’t need it or simply overlooking it among the many demands that come with running a business.

1. Use protection against ransomware
2. Invest in employee security training
3. Adopt multifactor authentication
4. Use a Security Information and Event Management system
5. Implement effective systems for protecting and monitoring data
6. Have a plan for mobile device security




cybersec

Industrial Cybersecurity Market to Reach $135.11 Billion by 2029 at a CAGR of 9.8%

(EMAILWIRE.COM, October 26, 2024 ) The industrial cybersecurity market was USD 84.54 billion in 2024 and is expected to reach up to USD 135.11 billion by 2029, growing at a CAGR of 9.8 %. Rising government and private investments to create safe and secure industrial environment, deployment of AI/Gen...




cybersec

LXer: Cybersecurity Regulations and Compliance for Linux Users

Published at LXer: Security is an essential consideration when using computers and other technological devices. Linux admins and organizations must be informed about applicable legal measures...



  • Syndicated Linux News

cybersec

Cybereason and Trustwave Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value

PRZOOM - Newswire (press release) - Tue, 12 Nov 2024 00:00:00 -0500, Chicago IL United States - Strategic Consolidation Offers Expanded Cybersecurity Suite of Market-Leading MDR, EDR, Offensive Security, DFIR, and Threat Intelligence - Trustwave.com / Cybereason.com



  • IT Security / Anti-Spam / Cybersecurity

cybersec

Eurotech Launches Industry’s First Cybersecurity-certified Modular Gateway - ReliaGATE 15A-14

PRZOOM - Newswire (press release) - Tue, 12 Nov 2024 00:00:00 -0500, Amaro Italy - One highly configurable certified solution for a wide range of IoT applications: eliminates custom design costs, speeds up global deployment, and simplifies connectivity while substantially cutting compliance efforts - Eurotech.com



  • IT Security / Anti-Spam / Cybersecurity

cybersec

Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach

Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its student retention. The mechanism suggested by this study was the out-of-class learning approach. Methodology: The researchers in this study employed a content analysis and adopted a semiotic method to analyze qualitative data. The researchers also conducted crosstabulation analyses using chi-square tests to detect the significant differences in the emerging learning outcomes from the two different out-of-class learning activities investigated in this study. Contribution: This study addressed the difficulty of cybersecurity education and proposed a viable mechanism to promote the student learning in such a complicated subject matter. Findings: For cybersecurity education, the out-of-class learning approach is a viable pedagogical mechanism that could lead the students to several learning outcomes, including connecting them to the real-life scenarios related to the cybersecurity profession, guiding them to their career choices and development, stimulating their intellectual growth, creating their justification of learning, and raising their cybersecurity awareness. Recommendations for Practitioners: The instructors of any cybersecurity programs should incorporate some out-of-class learning activities into the courses in their programs, especially the introductory-level courses. Additionally, it is important to coordinate the out-of-class learning activities with the in-class lessons to enable the students to justify what they have learned in their classrooms and motivate them to learn more. Recommendation for Researchers: Researchers could look beyond in-class learning and laboratory learning to investigate the impacts of out-of-class learning activities on cybersecurity education to help the students to attain better learning outcomes. Impact on Society: By promoting cybersecurity education, universities and colleges could attain a higher retention rate of the students in their cybersecurity programs. The higher retention rate of the students in cybersecurity programs would help to ease the critical shortage of cybersecurity talent. Future Research: Future research could explore the impacts of other out-of-class learning activities on cybersecurity learning; for example: job shadowing, attending cybersecurity conferences, internship, developing cybersecurity systems or tools for actual customers, working on cybersecurity research with faculty members. Additionally, future studies could investigate the effects of the out-of-class learning approach on promoting other academic programs that are characterized by intensely complex and technical nature, similar to cybersecurity programs.




cybersec

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




cybersec

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




cybersec

Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text

Ph.D. Dissertation Defense Modeling and Extracting Information about Cybersecurity Events from Text Taneeya Satyapanich 9:30-11:30 Monday, 18 November, 2019, ITE346? People now rely on the Internet to carry out much of their daily activities such as banking, ordering food, and socializing with their family and friends. The technology facilitates our lives, but also comes with […]

The post Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text appeared first on UMBC ebiquity.





cybersec

Cybersecurity Leader Theresa Payton Delivers ISC West 2023 Opening Keynote

This morning, Theresa Payton, the first female White House CIO, technology thought leader and cybersecurity expert, will deliver ISC West 2023’s opening keynote address. Payton will brief audience members on the current cybersecurity threat landscape, what to watch out for, how to respond if targeted, and what businesses can do today to be prepared for the future. Attend the keynote at 8:45 a.m. in Venetian Ballroom F.




cybersec

Cybersecurity Leader Admiral Mike Rogers Delivers ISC West 2024 Opening Keynote

This morning, Admiral Mike Rogers, Former Director, National Security Agency; Former Commander, U.S. Cyber Command; and Former Chief, Central Security Service, will deliver ISC West 2024’s opening keynote address. Attend the keynote today at 9 a.m. at the Main Stage.





cybersec

Zenitel Releases Cybersecurity Hardening Guide

Everything online in the industry, from white papers to webinars.




cybersec

Dahua Technology Achieves Multiple International Cybersecurity Certifications

Dahua Technology has received the Common Criteria (ISO/IEC 15048) EAL 3+ certificate, along with ISO/IEC 27001 for Information Security Management System, ISO/IEC 27701 for Privacy Information Management System, and CSA STAR certifications. 




cybersec

ISC West Keynotes: Cybersecurity, Events Security & Team Leadership

This year’s keynote presenters include five high profile individuals who are widely-respected for their professional and lifetime achievements.




cybersec

Confronting Cybersecurity Challenges Head-On

As digital threats loom large, manufacturers and security integrators are uniting to fortify the defenses of physical security systems. Discover how these industry players are navigating varied complexities and helping safeguard end users in the evolving realm of cybersecurity.




cybersec

The New DICE Awarded Patent for its Cybersecure Automated Network

This technology automates, streamlines  and manages on-site devices, delivering unparalleled security and ease-of-use for the security industry. The patent was issued on January 2, 2024.




cybersec

Surveying the Trends & Horizons in OT/ICS Cybersecurity

Ongoing integration of organizations’ information technology (IT) and OT environments revealed new cybersecurity hurdles to be overcome in areas such as supply chain vulnerabilities and complexities around protection of legacy systems.




cybersec

FCC Launches Cybersecurity Labeling Initiative for Smart Products

The “U.S. Cyber Trust Mark Program” aims to help consumers make informed purchasing decisions and encourage manufacturers to meet higher cybersecurity standards.




cybersec

Chimera Readies Cybersecurity Reseller Program for Prime Time

Chimera acquired AlchemyCore to establish a cyber-protection initiative within the company and to act as a cybersecurity reseller for integrators seeking to provide comprehensive building security solutions to their own clientele.




cybersec

Essential Cybersecurity Advice for Video Surveillance Teams

Experts in the know explain the critical need for cybersecurity training and education for security integrators in video surveillance, detailing best practices for building awareness, training staff on protocols, and fostering a culture of security within organization.




cybersec

Food and Beverage Manufacturers Face Mounting Cybersecurity Attacks

Connectivity provides manufacturing plant operations many advantages like increased productivity, faster identification and remediation of quality defects, and better collaboration across functional areas. However, this connectivity is dramatically increasing smart factories’ vulnerabilities and leaving them exposed to cybersecurity threats.




cybersec

Considerations for Assessing and Mitigating Food Manufacturing Cybersecurity Risks

Ahmik Hindman, senior networks and security consultant at Rockwell Automation, recently spoke about how food manufacturers can assess cybersecurity risks, implement security patches and build a cybersecurity risk management system.




cybersec

ACDS’ cybersecurity portfolio gains competitive edge from AI-powered thoughtworks application managed services

Thoughtworks, the global technology consultancy that integrates strategy, design and engineering to drive digital innovation, has started a strategic partnership with UK-based cybersecurity startup Advanced Cyber Defence Systems (ACDS) by providing Thoughtworks DAMO AI-powered application managed services.




cybersec

Strengthening the MSP portfolio: Navigating modern cybersecurity

By Marc Malafronte, director of sales, VIPRE Security Group.

As cyberattacks increase in frequency and sophistication, businesses must prioritize cybersecurity as a critical investment area. Managed service providers (MSPs) are crucial in supporting organizations on their cybersecurity journey.




cybersec

NMFTA influences next generation of cybersecurity professionals at CyberTruck Challenge

The National Motor Freight Traffic Association, Inc. (NMFTA) served as the lead sponsor for the CyberTruck Challenge. This year marked the third year that NMFTA had served in this sponsorship role.




cybersec

NASA, Teamed with FAA, Industry, and Academia, Should Research Effects of Increased Drone Traffic on Privacy, the Environment, and Cybersecurity

NASA should collaborate with the Federal Aviation Administration (FAA), industry, academia to research the full effects that increased unpiloted air vehicle traffic would have on society, including ramifications to sound, privacy, environmental matters, and cybersecurity, says a new report from the National Academies of Sciences, Engineering, and Medicine.




cybersec

New Report Charts Path Forward for FAA’s Cybersecurity Workforce

Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration, a new report from the National Academies of Sciences, Engineering, and Medicine, charts a path forward for creating and maintaining a cybersecurity workforce at FAA that can meet the challenges of a highly competitive cybersecurity labor market and a wave of future retirements.




cybersec

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders




cybersec

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!




cybersec

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




cybersec

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike




cybersec

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




cybersec

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure




cybersec

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.




cybersec

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices




cybersec

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry




cybersec

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship




cybersec

Generative AI biggest weapon and tool for cybersecurity: Microsoft's Brad Smith

Addressing cybersecurity attack concerns raised by generative AI, Smith said that there will be an increasing number of organisations and governments that will use the technology to develop cybersecurity threats.




cybersec

Cybersecurity firms CrowdStrike, Okta shares jump after better-than-expected earnings

CrowdStrike beat estimates when it reported late on Wednesday that its revenue jumped 37% to $731.6 million while adjusted net income more than doubled to $180 million in the second quarter on strong growth in subscriptions to its cloud-based data and identity protection services.




cybersec

Safety on the digital highway: Cybersecurity in freight trucking

As technology plays an ever-greater role in the shipping and logistics industry, bad actors have found new ways to infiltrate every part of a freight company. Here’s how trucking companies can protect themselves against cybercrime.