Search Results for: cybersecurity problems Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It... Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Blog Post A Safer IoT connected Christmas Light is Now Available December 18, 2019 Thinking about follow the Internet of Things trend, and decorate your tree with smart Christmas lights? IoT Christmas lights allow... Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Blog Post ReCIPE – The New Midwestern Cybersecurity Coalition January 6, 2022 A new cybersecurity coalition is forming in the Midwestern United States, led by electrical and computer engineering Professor Doug Jacobson... Blog Post Former Hacker Gives Advice on How to Protect Yourself from Cyber Crime December 23, 2021 Do you feel that your business is protected from cybercrime? According to former hacker turned cybersecurity expert Marshal Webb, you... Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently... Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,... Blog Post What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly... Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that... Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Blog Post A Safer IoT connected Christmas Light is Now Available December 18, 2019 Thinking about follow the Internet of Things trend, and decorate your tree with smart Christmas lights? IoT Christmas lights allow...
Blog Post State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish...
Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
Blog Post ReCIPE – The New Midwestern Cybersecurity Coalition January 6, 2022 A new cybersecurity coalition is forming in the Midwestern United States, led by electrical and computer engineering Professor Doug Jacobson...
Blog Post Former Hacker Gives Advice on How to Protect Yourself from Cyber Crime December 23, 2021 Do you feel that your business is protected from cybercrime? According to former hacker turned cybersecurity expert Marshal Webb, you...
Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and...
Blog Post New Malware Samples Show Apple Isn’t Invulnerable to Attacks February 1, 2022 Apple devices are often preferred for their tighter security than devices from its biggest competitors, Samsung and Windows. However, recently...
Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,...
Blog Post What’s Your Security Maturity Level? August 4, 2021 Unfortunately, most organizations only learn the value of maturing their security and integrating it into their culture after a costly...
Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that...
Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...