Thursday, August 22, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 2

News

700,000 records belonging to Choice Hotels customer leaked online. Crooks demanded ransom

Security experts have discovered that hackers have stolen 700,000 records from Choice Hotels franchise and are demanding payment for their return.  Experts at Comparitech with the help of the popular researcher Bob Diachenko discovered an unsecured database containing 700,000 records from the...

August Patch Tuesday

Take Advantage of Your August Patch Tuesday Break By Chris Goettl, Director of Product Management, Security, Ivanti August Patch Tuesday was a pleasant relief after the massive release of updates in July. But don’t sit in your lawn chair and open...

US $12 Billion IoT Security Products Market Growing Steadily, Manufacturing & Healthcare Key Sectors

IoT is making the transition from being a buzzword to becoming an integral component in many verticals. However, in a hyper-connected world, a chink in the armor can lead to unprecedented catastrophe. While we cheer the dawn of a...

Data Breach: Steps Not To Take After It

By Vera Salauyova, PR manager at Falcongaze company There are many recommendations on what to do after a data breach. But what shouldn’t you do? Has your company ever been hacked? Or have you received a notice your personal information or...

Cyber security Insurance Policy and Coverage

Reading is Fundamental By Charles Parker, II The business of malware has become operationalized such that a majority of instances are to generate revenue for the attacker(s) via ransomware, harvesting credentials, exfiltrate data, and other data. To gain access to the...

What NIST’s Cybersecurity Framework is and why it matters

Practical advice to help you build a solid InfoSec plan By Michelle Drolet, CEO, Towerwall The risk of your business falling victim to cybercrime has never been higher. Despite a seemingly endless parade of high profile data breaches, ransomware attacks, and...

Cyber War Of Nation-States

TARGETING By Geoffrey Nicoletti, Independent Research Analyst Taking down power grids as the first priority in nation-state cyberwar is a myth. Actually, the first priority is taking down the adversary's counter-strike capability. "Assets" and "timing" are critical here. If you miss striking...

Detecting The Covert

Security Through Intelligence By John Williams, Product Manager, Node4 The business has always had to protect its assets. Fifty years ago it would have been tall walls of bricks and mortar, maybe a little razor-wire and issuing identity cards to employees,...

Is your desktop telephone secure?

IT security should include Telephony security By Wim Brouwer, Product Manager, RSconnect Protecting sensitive and personal data is a key priority today at many organizations worldwide. This focus is stimulated by the many examples of cyber crime, often with serious impact...

Convenience Does Not Overrule Common-Sense and Industry Standards

Applications By Charles Parker, II In IT, convenience has taken much more of a focus as of late. Businesses don’t upgrade or update for a number of reasons. The user’s requests or “requirements” are being used as an example and may...

STAY CONNECTED

36,264FansLike
55,564FollowersFollow
Show Buttons
Hide Buttons