The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
What is a Hacktivist?
Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness.
Personal Information: What’s your Inter net worth?
Personal Information in High demand All of the data breaches in the news hint that the demand for personal information is not slowing down. Information is being stolen and sold across the dark web at
CAA Record: A Small Step Towards a Safer Internet
A Case of Misplaced Trust A lot of trust is placed in certificate authorities. SSL/TLS on its’ own protects against a malicious actors. It does this by intercepting communications. However, certificate authorities do nothing to
Always Read the Privacy Policy for Your VPN
You Didn’t Read the Privacy Policy?! The privacy policy is the single most important document governing the guidelines around which a VPN functions. However, it has almost become a ritual to not read it. Everyone
Cybersecurity Market: Trending Upwards
Rising Cybersecurity Market Trends The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the
Hospitality Breaches
Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large
ElsaGate: The Problem With Algorithms
Social Engineering can take many forms. Sometimes it’s a phone call attempting to extrapolate your mother’s maiden name. Other times it is an email attempting to gain rapport and get you to click on a
Malicious Apps: For Play or Prey?
Malicious Apps Today’s society is adapting to excessive use of cell phones and personal data stored in them. Federal laws have been changed to protect citizens from police authorities rummaging through our cell phones without