The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
Data Security in the Ecommerce world – Is SSL an Answer?
When it comes to data security, it is necessary for Ecommerce websites to earn their target audience’s trust. One way of making this possible is by acquiring, integrating, and effectively using an SSL certificate. Without
Collection #1: Are you One of Over Two Billion?
Collection #1: Are you One of Over Two Billion? Malicious actors wasted no time making the news in 2019. Collection #1 was the largest collection of stolen data in history. The breach revealed two billion
A Brief and Incomplete History of Cybersecurity
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents
The Evil Twin Attack: Safe use of Public Internet
Wireless connectivity has existed now for more than twenty years. And as technology advances, wireless access to the internet increases. Public WiFi access points are everywhere. They exist in restaurants, coffee shops, and shopping malls.
Watering Hole Attacks: The Tainted Oasis
Watering Hole Attacks: The Tainted Oasis Watering hole attacks are still wreaking havoc on targeted groups and institutions around the globe. These attacks target major corporations and financial institutions. However, now they are penetrating these
Top 10 Cybersecurity Risks For 2019
2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally
The Consequences of Digital Piracy
Digital content can be quite expensive. Especially when you get into the high-end software packages. Sometimes this content costs several thousand dollars. But not everyone can afford these prices. If you have spent any amount
Defense Against Man-In-The-Middle Attacks (MITM)
What You Need For The Best Defense Against Man-In-The-Middle (MITM) Attacks Man-in-the-middle (MITM) attacks involve the interception of communication between two or more digital systems. Because of this, they are both difficult to detect and