The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Logic Bombs: How to Prevent Them
A logic bomb is a piece of malicious code that hackers insert into a software or operating system. This code lies dormant until a specific condition occurs. These conditions could be a pre-determined time (often
Steps Businesses Must Take to Prevent Data Breaches
Cyber-attacks are not something to take lightly as a business. In fact, they can be detrimental to your finances and tarnish your reputation in the process. Within the past five years, the cost of data
Business Solutions That Are More Secure in the Cloud
One of the big decisions company owners must make is whether to use cloud-based or on-premises business solutions. Here are five solutions that are more secure when hosted in the cloud. Content Storage Google Drive,
The Biggest 2020 Cybersecurity Threats
Cybersecurity threats, as we discussed in our recent 2019 data breach article, were a huge problem in 2019. Within the first 6 months, Forbes reported that 2019 yielded 3,800 publicly disclosed breaches, a 52% increase
Safe Apps: How Can You Tell?
StandHogg Hits Google Store According to Forbes, Google Android Threats continue to permeate through malware ridden apps that may affect many Android users. Researchers at the Norwegian app security company Promon claim that safe apps
Emergency Actions After Hacking
Hacking has become ubiquitous on the internet. With even major companies like Evernote getting hacked, it’s not hard to imagine that you, an individual, could also get hacked. The experience is actually quite common, though
OnePlus Reveals Second Data Breach in Two Years
Smartphone manufacturer OnePlus has been the victim of a data breach in which an unauthorized party gained access to customer’s order information. One Plus has released a statement revealing that customer names, contact numbers, emails,
What You Need To Know About Disaster Recovery Planning
Natural disasters have a way of wreaking havoc on Earth. However, is that the only disaster you need to remain cautious of? We have to deal with man-made disasters more regularly than the natural ones.