Author Description

Author Posts

Yes, one USB drive can cause HAVOC

By Ruben Lugo of Kingston Technology The wizardry one USB drive can cause and provide. Whether it’s…

A New Class of Cyber Threat: Digital Threats Are Targeting Your Digital Innovation Programs

By Lou Manousos, CEO, RiskIQ Everyone uses the internet, both the good guys and bad guys. In…

Standby Virtual Desktops: The IT Insurance Policy For Mayhem

By Michael Abboud Allstate’s “mayhem” commercials underscore the need to protect yourself and your property from life’s…

Browser-based Cryptocurrency Miners

By Shawn Pope Towards the end of 2017, browser-based cryptocurrency mining activity increased significantly. In fact, we…

Facial Recognition

Iphones are not the only one with issues By DRP; Cybersecurity Lab Engineer The consumer’s focus, and…

Building a Security Operations Center to Reinforce Trust

By Tom Gilheany, portfolio manager for security training and certifications, Cisco Services To succeed in today’s digital…

If You Want to Prevent Breaches, Don’t Make These Three Security Mistakes

By Destiny Bertucci, SolarWinds Head Geek™ There’s one thing that the most high-profile security breaches have had…

“Feds Bet on A.I. to Fix Uncle Sam’s Cyber Woes”

We have all heard the saying, “don’t bet on the horses,” but What about betting on artificial…

Demystifying the Source Code vs. Binary Debate

By Taylor Armerding, security consultant, Synopsys Is exposure to software source code disastrous enough to merit a…

Smart Home Cyber Security

By Matthew James Smart homes are homes connected through the so-called Internet of Things (IoT). They have…

Show Buttons
Hide Buttons