How to recruit, retrain, and retain with creativity and discipline. As threats escalate and enterprise cybersecurity teams struggle to build teams that can handle mounting volumes of work, the...
Read moreSecurity Technology Cannot Stop All Attacks
July 2 2018A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply...
Read moreRedefining Security with Blockchain
July 2 2018Blockchain offers a proactive approach to secure a new generation of digital platforms and services for both enterprises and individuals. As the computing environment becomes more open and diverse,...
Read moreTicketmaster UK Warns Thousands of Data Breach
July 1 2018Customers who bought tickets through the site are advised to check for fraudulent transactions with Uber, Netflix, and Xendpay. Ticketmaster UK has notified tens of thousands of customers that...
Read moreAnalyzed cards, mainly from smartphones and tablets, contained private personal information, business documentation, audio, video, and photos. Wipe your device, then check it twice: A new study has found...
Read moreThe 6 Worst Insider Attacks of 2018
July 1 2018Stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the hurt on some very high-profile employers. Image Source: Adobe Stock (Andrea Danti) If recent statistics are any...
Read more
Recent Comments