The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Companies Must Prepare for Escalating Ransomware Attacks and Threats
There certainly have been some dangerous ransomware attacks in the recent past. In 2017, the WannaCry ransomware attack exploited a security flaw in Microsoft Windows OS to hold over 200,000 computers hostage worldwide. The hospitals
Airbnb Cybersecurity Concerns
As the COVID-19 pandemic is beginning to die down and promising vaccines are being distributed, many people are starting to make their travel plans for the summer. That means flights will be selling out, hotel
5 Factors for Evaluating an RMM Tool for the Modern MSP
Managed Service Providers (MSPs) are becoming increasingly important in the IT management industry. The role of an MSP does not just stop with monitoring, managing, and maintaining the IT services of their clients; it extends
All Aboard! Onboarding and Securing Your New Endpoints
Any IT admin worth their salt knows that onboarding new employees or endpoints is not quite as simple as yelling “All aboard!” like a merry captain of a cruise ship. It’s been more than a
5G Technology and Cybersecurity
The rave that came in with the advent of 5G Technology was well-founded with the promise of promoting smart cities, a much faster internet connection for cell phones, and faster data download and upload speeds.
Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): What is the Difference?
An Intrusion Prevention System – or an IPS – is a network security technology (and control system) that monitors networks and traffic for any vulnerability exploits or malicious activity. IPS will automatically either allow or
Endpoint Security – Cutting Through the Complexity With Clear-Cut Requirements
Endpoint security has evolved drastically over the past 10 years. While previously it only referred to ‘anti-virus’ and typically only on workstations, endpoint security has been replaced by a bewildering array of options that can
Cyber Self-Defense Is Not Complicated
Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass