Search Results for: investing Blog Post Former Hacker Gives Advice on How to Protect Yourself from Cyber Crime December 23, 2021 Do you feel that your business is protected from cybercrime? According to former hacker turned cybersecurity expert Marshal Webb, you... Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who... Blog Post Younger People Less Likely to Report, More Likely to Fall Victim to Cyber Crime December 24, 2021 A recent study by Atlas VPN reveals that younger individuals aged 18 to 40 are significantly less likely to report... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Blog Post New Self-Replicating Ryuk Ransomware Strain Sparks Fear Among Security Experts and Businesses April 7, 2021 Ryuk has been one of the most active, damaging, and feared ransomware in circulation since August 2018. Now, a new... Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing... Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face... Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...
Blog Post Former Hacker Gives Advice on How to Protect Yourself from Cyber Crime December 23, 2021 Do you feel that your business is protected from cybercrime? According to former hacker turned cybersecurity expert Marshal Webb, you...
Blog Post US Government to Offer up to $5,000 ‘Bounty’ to Hackers to Identify Cyber Vulnerabilities January 27, 2022 A bug bounty program is one where an entity (usually a company) offers up a cash reward for anyone who...
Blog Post Younger People Less Likely to Report, More Likely to Fall Victim to Cyber Crime December 24, 2021 A recent study by Atlas VPN reveals that younger individuals aged 18 to 40 are significantly less likely to report...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud....
Blog Post Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Blog Post New Self-Replicating Ryuk Ransomware Strain Sparks Fear Among Security Experts and Businesses April 7, 2021 Ryuk has been one of the most active, damaging, and feared ransomware in circulation since August 2018. Now, a new...
Blog Post Increasing Maturity Of Cybersecurity Awareness Programs June 25, 2021 In today’s digital environment, businesses, from small enterprises to established corporations, are constantly exposed to security risks. Most are continuing...
Blog Post How the SolarWinds Hack Happened – Everything You Need to Know February 4, 2021 Since mid-December 2020, the U.S. government, the security community, big business, and big tech have been reeling in the face...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
Blog Post Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...