Archive
Safer Internet Day 2018 Not Without IoT Security
Safer internet day 2018- admirable goal, but impossible to achieve without considering IoT Security.“Safer internet day 2018” was celebrated on February 6th. It was an opportunity to stop and think
How Bad Biometrics Decisions Can Create a Lasting Brand Nightmare
Great brands earn the trust of their loyal customers over time. But, brands are created by businesses, businesses are created by people, and people make mistakes. Fixing a mistake can
Cybersecurity pros don’t feel equipped to stop insider attacks
Based on interviews with nearly 1,500 cybersecurity professionals over three years, Haystax Technology released a study that makes it clear that organizations are feeling the pressure from insider threats and
A view of the global threat landscape: Cybercrime and intrusion trends
Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy systems, according to a new report
In the Cloud, On the Ground: Securing Office 365 and Hybrid Environments
Within the last two decades, companies have spent billions, and more likely trillions, converting analog information to digital. At the same time, we’re producing data at rates few could imagine
What is SQL injection? This oldie but goodie can make your web applications hurt
SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and
Everything your business should know about the impending GDPR
Businesses need to take a risk-based approach, focusing compliance efforts on their biggest vulnerabilities With the GDPR deadline passing the 100 day mark recently, the May 25th deadline looms closer.
Business leaders need to keep up with data breach headlines
New software also brings with it new threats to the overall security of an organisation, so understanding the potential risks and vulnerabilities software introduces is essential if businesses want to
CrowdStrike Reports Average Breakout Time for Cyber-Attacks
Cyber-security vendor CrowdStrike released its 2018 Global Threat Report on Feb. 26, providing insights from the company’s globally distributed network that processes approximately 100 billion events a day. Among the
Cryptojacking is the new malware
The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which thse currencies are earned. At its core, mining for cryptocurrency requires massive