Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily […]
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced […]
Why “Cloud Security 101” Isn’t So Simple After All
By Josh Stella, co-founder, and CTO of Fugue The term “cloud misconfiguration” may not seem like an adequate term to describe the leading cause of cloud data breaches. It connotes […]
What Other Companies Can Learn from Facebook’s $5 Billion Fine
Organizations need to view government demands as the floor rather than the ceiling when it comes to protecting consumer data By Jacob Serpa, researcher, Bitglass While Facebook’s $5 billion settlement […]
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers […]
5 Most Disastrous Ransomware Attacks of the Last Decade
In the past few years, we have seen a massive change in the hacking industry. Let’s take a look at the most dangerous ransomware attacks and how to stay safe […]
4 Industries Being Hurt by Counterfeit Materials (And How to Spot Them)
By Kayla Matthews There are many industries with a lot to lose when it comes to counterfeit parts and materials. Today, we’ll talk about four of them. The dangers are […]
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the […]
Veiled Vulnerability
AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]
NK is the new Iraq?
By Rodrigo Ruiz Referring to the television series Orange is the new black, I can not but consider it very convenient to blame the North Koreans for the worldwide incident […]
State Cyber security Regulation: Another Patchwork Approach?
By Jami Mills Vibbert with Venable LLP Until recently, state oversight of cybersecurity has been relatively limited. Indeed, although 48 of 50 states have laws related to data breach notification, […]
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness. […]
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is […]
5 ways small businesses can be affected by a cyber security breach
By Asher de Metz A large-scale cybersecurity breach is hugely damaging for any organization, and with hackers becoming increasingly sophisticated, the chances of getting caught out are constantly growing. No […]
How context-aware security adds layers of protection to single sign-on services
By François Amigorena, CEO, IS Decisions Single sign-on, to the user, is a godsend. No more wasting time putting in passwords to individual sites or applications, no more trying to […]
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce […]
The intelligent control systems and their perspectives
By Milica D. Djekic The current industry would deal with many intelligent and even smart mechatronics solutions. Also, those sorts of solutions would be used as part of smart homes, […]
WannaCry ‘Remedies’: The Second Wave of Attacks
By Fernando Cuervo, Detect Monitoring Service Leader, Easy Solutions Since May 12th, over 200,000 victims in 150 countries have been hit by a massive, international ransomware cyber attack called WannaCry. […]
Mastercard data breach affected Priceless Specials loyalty program
Mastercard disclosed a data breach that impacted customer data from the company’s Priceless Specials loyalty program. The American multinational financial services corporation notified the data breach to the German and Belgian Data […]
Evidence in Marriott’s subsidiary Starwood hack points out to China intel
According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to the Reuters, people investigating the Marriot data breach believe that it […]
Instagram glitch exposed some user passwords
Instagram has suffered a serious security leak that might have exposed user’s passwords, revealed The Information website. Instagram notified some of its users that it might have accidentally exposed their […]
Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues
Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies […]