The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers....
Hi, what are you looking for?
The holiday season is in full swing and once again we can expect to see a surge in cyber attacks targeting retailers and consumers....
As I’ve written before, sophisticated adversaries are finding vulnerabilities wherever they can, and often that means looking to an organization’s supply chain for weaknesses...
While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization...
The recent Equifax breach that has been all over the news raises an interesting question: How would the situation have played out if it...
Have a safe trip! Typically, when we wish someone well before they leave on a journey we are referring to their physical safety while...
We’ve all heard the phrase: “When one door closes, a window opens.” You can bet that as you’re reading this, those engaged in cyber...
Approximately 250 years ago Samuel Johnson said, “The next best thing to knowing something, is knowing where to find it.” This is quite a...
With numerous instances of account takeovers impacting companies like Groupon, TeamViewer and Camelot, the company that operates the U.K.’s National Lottery, as well as...
Influential Organizations and Individuals or Those With Ties to Government or Political Institutions May be Targets for Cyber Attacks
I’ll venture to guess you’re using a mobile device to read this. In the most recent Ericsson Mobility Report (PDF), the total number of...
Bad Actors Will do Whatever They Can to Take Advantage of the Lucrative Tax Season
Like any business, cybercriminals offering their services need to develop and maintain a brand and reputation in order to attract customers.
Financial institutions have long been an attractive target for threat actors due to the information they hold, their role as part of critical national...
Valentine’s Day is fast-approaching and the story goes that if Cupid hits you with his golden arrow you’ll fall madly in love. And who...
The ancient Greeks are credited with many inventions that continue today in some form – the water mill, odometer, alarm clock and cartography, to...
Ringing in a More Secure 2017
It’s that time of year again...when consumers, retailers and manufacturers need to understand and be alert to the latest cyber attacks that threaten to...
Exploit kits, pre-packaged software that uses vulnerabilities in software applications to spread malware, are not new to the information security community. Since 2006, when...
To say that the 2016 U.S. Presidential election cycle has been unusual would be an understatement for a number of reasons. As a security...