Cyber Daily

The CSO Conference & Awards: A Brief History

The CSO Conference & Awards: A Brief History

The CSO Conference & Awards has evolved into a premier event for cybersecurity professionals and leaders. Formerly known as CSO50,...
Read More
Blockchain Technology: From Hype to The Future

Blockchain Technology: From Hype to The Future

The mysterious blockchain technology. Well, it was mysterious. In fact, at one point, it was futuristic. And there was so...
Read More
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government

The quest for innovative solutions is relentless in an era where government agencies and service providers grapple with increasingly sophisticated...
Read More
Account Takeover Fraud: Navigating the Treacherous Digital Waters

Account Takeover Fraud: Navigating the Treacherous Digital Waters

In the bustling marketplace of online retail, where transactions occur at lightning speed and global boundaries blur, a silent guardian...
Read More
The Importance of Jailbreaks for iOS Security Work

The Importance of Jailbreaks for iOS Security Work

The realm of iOS security research has seen significant advancements in recent years. With each new iOS release, Apple tightens...
Read More

{Latest Posts}

Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

Risk Management

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…

Read More »
Cyber man investigating data breach holds a magnifying glass up to his eye, man is made of pixels and abstract colors and code

Don’t Breach My Data

In this day and age, there’s always news reports of the latest big data breach. We had the HBO breach for the original series Game of Thrones, there was the Equifax breach, Target, and…

Read More »
Group of people working in an office SMB

SMB Best Practices in Security

Are you a small to medium size business owner (SMB)? Are you actively implementing cybersecurity best practices for your SMB? Many SMBs have a mindset that cyber-attacks won’t reign down on them. The “I…

Read More »
A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…

Read More »
Fingerprints against a blue background and encrpytion symbols to represent Biometrics

Biometrics and Encryption

We know that biometrics run on comparison surgeries, where the sample is taken and that this pattern is used for confirmation and the identification of the principal. This template is known as a blueprint…

Read More »
Cloud connecting to people in tech circles, network integrity

Network Integrity

Network integrity starts with a network diagram. Actually, most things regarding technology risk should start with a network diagram. Your network is the circulatory, nervous and endocrine systems of your company. As such, it…

Read More »