Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims

The aim of this study was to determine the prevalence of cyberstalking victimization, characteristics of victims and offenders, and the impact of cyberstalking on the victims’ well-being and mental health. An online survey of 6,379 participants was carried out, involving users of the German social network StudiVZ. Subjective mental health status was assessed with the…

Reinventing M&A and integration strategy

As technology advances at warp speed, companies should consider how their M&A programs can take advantage of big data to make better and faster decisions. Watch the video below to hear from Mitch Berlin and Sid Khosla, about how big data, analytics, cybersecurity, cloud computing, and social media play a role in developing a strategic…

Cyber Threats vs Vulnerabilities vs Risks

It’s common for terms such as cyber threats, vulnerabilities and risks to be conflated and confused. This post aims to define each term, highlight how they differ and how they are related to one-another. Cyber Threats Cyber threats, or simply, threats refer to circumstances or events with the potential to cause harm by way of their outcome. A few examples of…

College Kids Turn to Crypto-Mining, Riddling Higher-Ed Networks

The higher-education landscape has become a fertile field for growing crypto-mining revenue. College students are crypto-mining from their dorm rooms, while outside actors are targeting their online activities for web-based attacks. According to Vectra’s 2018 RSA Conference Edition of its Attacker Behavior Industry Report, higher education is a prime arena given that students are usually not…