At many companies, there’s a gap between security and what is generally called operations, or more colloquially, ‘the rest of the organization’. That gap is becoming an issue, because...
Read more7 Loyalty Program and Rewards App Attacks
March 4 2020The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights. Image Source: Adobe (Andrey Popov) Cybercriminals love loyalty cards and mobile pay...
Read more7 Loyalty Program and Rewards App Attacks
March 4 2020The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights. Image Source: Adobe (Andrey Popov) Cybercriminals love loyalty cards and mobile pay...
Read moreAvoiding the Perils of Electronic Communications
March 4 2020Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That’s why an agile communications strategy is so important. One of...
Read moreAvoiding the Perils of Electronic Communications
March 4 2020Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That’s why an agile communications strategy is so important. One of...
Read moreMessaging / Smishing Attacks
March 4 2020Overview One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick...
Read moreMessaging / Smishing Attacks
March 4 2020Overview One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick...
Read moreGotta Patch ‘Em All? Not Necessarily, Experts Say
March 4 2020When it’s impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized. Modern security teams face a daunting task in keeping up with...
Read moreGotta Patch ‘Em All? Not Necessarily, Experts Say
March 4 2020When it’s impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized. Modern security teams face a daunting task in keeping up with...
Read more
Recent Comments