The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
End-to-End Encrypted (E2EE) Messaging Apps – New Criminal Frontier?
End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the…
Understanding Ransomware: A Brief Overview
Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…
Darknet Intelligence Secrets Revealed
Cyberattacks and data breaches are part of our day-to-day life, so much so, that people have become desensitized to these events. In every case, the customers’ compromised data recompense is “credit monitoring, free for…
Understanding the Meltdown and Spectre Scare
The latest cybersecurity scare involves a set of three exploits, two named Spectre (variants one and two) and one named Meltdown (or variant three). It is important to understand that these are not actual…
Small Business: Cybersecurity on a Budget
Since the Crime Survey for England and Wales cited cybersecurity as the most common crime in the UK for 2017, it has become clear that cybersecurity is a rapidly growing threat that requires higher…
Social Media Data Exploitation
Former data analytics contractor Christopher Wylie blew the whistle on an independent company for harvesting the Facebook information of more than 50 million people in the United States, resulting in one of the most…
Addressing the Gender Gap in the Cybersecurity Field
Cybersecurity is, and has always been a male dominated field. When the stereotypical archetype of an ethical hacker or cyber warrior pops into your head, the image conjured is usually a man in a…
Cybersecurity Insurance
The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…