Search Results for: competitor Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post New Mac Malware Raising Questions About Apple’s Security Patching December 28, 2021 For many dedicated Apple customers, enhanced security is one of the main reasons they prefer these systems over its competitors.... Blog Post Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group... Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Blog Post Motivations Behind Cyber-Attacks March 4, 2020 Cyber attacks are malicious attacks on computer systems and networks for damaging data or disrupting operations. Common types of cyberattacks... Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set.... Blog Post User Data Can be Collected Through VPN and Ad-blocker Apps March 18, 2020 Recently, the well-known mobile application data analysis company Sensor Tower used iOS and Android’s VPN and ad-blocker applications to secretly... Blog Post Ring Now Forces 2FA Logins February 23, 2020 Amazon is reportedly enforcing mandatory 2FA on Ring account logins. Although 2FA (two-factor authentication) is already optional for Ring accounts,... Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the... Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Blog Post Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal...
Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post New Mac Malware Raising Questions About Apple’s Security Patching December 28, 2021 For many dedicated Apple customers, enhanced security is one of the main reasons they prefer these systems over its competitors....
Blog Post Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post REvil Ransomware Gang Warns Stolen Apple Blueprint Leak May 4, 2021 Recently, the REvil ransomware gang has offered Apple to buy back stolen device blueprints to inhibit the leak. The group...
Blog Post How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
Blog Post Motivations Behind Cyber-Attacks March 4, 2020 Cyber attacks are malicious attacks on computer systems and networks for damaging data or disrupting operations. Common types of cyberattacks...
Blog Post CISOs Will Need To Invest In Anti-Surveillance Technologies In 2020 December 26, 2019 According to The New York Times, their reporters can even obtain the location data of people through the data set....
Blog Post User Data Can be Collected Through VPN and Ad-blocker Apps March 18, 2020 Recently, the well-known mobile application data analysis company Sensor Tower used iOS and Android’s VPN and ad-blocker applications to secretly...
Blog Post Ring Now Forces 2FA Logins February 23, 2020 Amazon is reportedly enforcing mandatory 2FA on Ring account logins. Although 2FA (two-factor authentication) is already optional for Ring accounts,...
Blog Post Cyber Security Plan for Industrial Control Systems March 10, 2020 What is an Industrial Control System? An industrial control system (ICS) is a control system that is associated with the...
Blog Post Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Blog Post Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal...