October was National Cyber Security Awareness Month, which served as an important annual reminder for organizations to never let their guard down when it...
Hi, what are you looking for?
October was National Cyber Security Awareness Month, which served as an important annual reminder for organizations to never let their guard down when it...
On September 22nd, Canadian-based e-commerce company, Shopify, disclosed a security incident involving the breach of data belonging to almost 200 merchants (and their customers)....
Post-mortem analysis of data breaches shows that most of today’s cyber-attacks are front ended by phishing campaigns. The most recent CryptoForHealth Twitter Hacker is...
On July 15th, US-based microblogging and social networking service, Twitter, disclosed a security incident whose full impact has yet to be determined.
With Many Employees Working From Home, the Enterprise Attack Surface Has Increased Significantly
Since the introduction of computers, usernames and passwords have been the primary method used for access control and authentication. However, as post-mortem analysis of...
Under the Current Economic Conditions, Security Professionals Must Quickly Re-assess Their Approach to Defending Against Insider Threats.
The COVID-19 Health Crisis is Forcing Enterprise Security Teams to Deliver More With Less
Static Passwords Are No Longer Enough to Secure Systems
The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...
Threat actors tend to focus on the human element as the weakest link in the cyber-attack chain, often using stolen, weak, default, or otherwise...
Understanding the Threats, Risks, and Vulnerabilities Associated With Cloud Environments is Critical to Securing Data