Cyber Daily

The CSO Conference & Awards: A Brief History

The CSO Conference & Awards: A Brief History

The CSO Conference & Awards has evolved into a premier event for cybersecurity professionals and leaders. Formerly known as CSO50,...
Read More
Blockchain Technology: From Hype to The Future

Blockchain Technology: From Hype to The Future

The mysterious blockchain technology. Well, it was mysterious. In fact, at one point, it was futuristic. And there was so...
Read More
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

The quest for innovative solutions is relentless in an era where government agencies and service providers grapple with increasingly sophisticated...
Read More
Account Takeover Fraud: Navigating the Treacherous Digital Waters

Account Takeover Fraud: Navigating the Treacherous Digital Waters

In the bustling marketplace of online retail, where transactions occur at lightning speed and global boundaries blur, a silent guardian...
Read More
The Importance of Jailbreaks for iOS Security Work

The Importance of Jailbreaks for iOS Security Work

The realm of iOS security research has seen significant advancements in recent years. With each new iOS release, Apple tightens...
Read More

{Latest Posts}

cybersecurity resume

How to Write a Cybersecurity Resume

Everyone knows that the job marketplace is extremely competitive. To stand out, job applicants need to check all the boxes that the recruiter needs. However, cybersecurity resumes are a different beast all together. Indeed, one

Read More »
cybersecurity skills market

Cybersecurity Skills Market in the U.S.

You cannot go a week without hearing about a new cyber attack. It seems that every day, big corporations leave information vulnerable to hackers, who swoop in and steal our personal data. Cybersecurity is critical

Read More »
Smart Card Isometric Mobile Phone And Internet Banking. Online Payment Security Transaction Via Credit Card smart cards

Smart Cards Security In Biometrics

Identity and Access Control Smart cards are essential to electronic identity and access management solutions. Indeed, this has been the case for at least 30 years now. Identity and access management can allow or deny

Read More »
cybercriminals, hacker dude in a movie or tv show cybercriminals

Cybercriminals in Movies and TV Shows

Hollywood has long held a certain image of cybercriminals. What they look like, how they commit their crimes, and their motivations. However, like many things in Hollywood, the portrayal of hackers and cybercrime in general

Read More »
Ransomware

Ransomware: Harbinger of the Future

The recent spate of ransomware attacks on Texas municipalities is a harbinger for the future of cyber-crime. In fact, according to various news sources, as of August 23rd, 2019, at least 22 municipalities in Texas

Read More »