Tag "Cyber Security Guidelines"
By Vitali Kremez, Director of Reasearch at Flashpoint, Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo. Access to some of
There’s been a lot of talk about security tokens recently. But what is a security token in the first place? How do they work? And how might they impact your
A few weekends ago, my dog bit me. In his defense, it was dark and I had tackled him unexpectedly to stop him from walking off our under-construction, railing-less deck.
With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital
October is officially National Cyber Security Awareness month, and this year one of the program’s key messages is working together to secure critical infrastructure from cyber threats. Clearly, security weaknesses
As the 2018 midterm elections near, many remain concerned about the security of election infrastructure at the national level, though Steve Grobman, CTO at McAfee, said the realistic security risk lies
More than three months after GDPR came into effect, businesses have found themselves between a rock and a hard place – taking every step possible to correct protocols, policies and