The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
How to Create a Cybersecurity Plan for Your Small Business
As a small business owner, it’s essential to protect your company’s data and systems from cyber threats. With the increasing reliance on technology and the internet for communication and conducting business, it’s more important than
How Cryptocurrency Impacts Cybersecurity
22% of surveyed companies in the United States lost between $100,000 and $499,000 to cyber-attacks in 2022. That is only one segment, as 4% lost over a million dollars to cybercrime. So, how do cryptocurrencies
How to Protect Employees Against 5 New Cybersecurity Threats
Cybersecurity is a continually changing field. As businesses resolve old vulnerabilities, attackers develop new strategies that work around them. Defenses must repeatedly evolve to remain secure. If employers want to keep their employees safe, they
Telegram: A Thriving Hub of Criminal Activity
Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information
Natural Language Processing (NLP) and All That Comes With It
People don’t often think about the ambiguities that come with human language. They use language as an intuitive behavior to pass information using semantic cues such as signs, images and words. It is the easiest
What is Credential-Stuffing? And How Bad Actors Use it to Attack You
Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and steal your personal information. Credential-stuffing is a form of automated attack that involves hackers using
Blockchain Smart Contracts and Supply Chain Security
With the ignominious demise of FTX in recent months, cryptocurrency has been much in the news of late for all the wrong reasons. The reality, however, is that blockchain technologies, through which the various cryptocurrencies
How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars
During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the internet. These thieves have become more intelligent and can go past computers and cell phones