Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

A Passwordless Future: Will Biometric Identification Replace Passwords?

By Joshua Frisby, Founder of PasswordManagers.co From Face ID to scanning your fingerprint to unlock your phone, biometric authentication is weaved into almost every device that we rely on. It…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on A Passwordless Future: Will Biometric Identification Replace Passwords?

Iphone Extraction Without A Jailbreak

Imaging the file system and decrypting the keychain from iOS devices without jailbreaking By Oleg Afonin, Security Researcher, ElcomSoft Co.Ltd. Traditionally, forensic experts without access to proprietary technologies had relied…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Iphone Extraction Without A Jailbreak

The Ransomware Age and How to Fight It

By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt We are living in an age where ransomware continues to grow and the number of attacks has increased especially during the COVID-19 pandemic. Data encryption…

Posted in Uncategorized | Tagged , , , , , , | Comments Off on The Ransomware Age and How to Fight It

Still Using Spreadsheets to Manage Your Digital Certificate Security?

Here are 5 reasons to stop. By Ryan Sanders, Product Manager, Keyfactor The proliferation of devices and applications like IoT, DevOps, and cloud has dramatically increased the number of digital…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Still Using Spreadsheets to Manage Your Digital Certificate Security?

Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Network monitoring solutions are becoming increasingly vital given that they help detect abnormalities in IoT device functionality & prevent attacks before they take place. As IoT continues to disrupt the…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Network Monitoring Solutions and Their Contribution Towards Developing A Robust IT Infrastructure

Digital Healthcare: How Secure Is the Care Data?

By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing,…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Digital Healthcare: How Secure Is the Care Data?

The Devil Inside

Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on The Devil Inside

Mobile App Security in The Midst of a Pandemic

By Tom Tovar CEO and co-creator of Appdome In the “new normal” of COVID-19, businesses are relying on mobile apps to ensure business operations and revenue flowing. Restaurants, grocery stores,…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Mobile App Security in The Midst of a Pandemic

Top Global CISOs, Top InfoSec Innovators and Black Unicorn Awards Program for 2025 Now Open...

X

Stay Informed. Stay Secure. Read the Latest Cyber Defense eMag

X