Cyber Daily

Natural Language Processing (NLP) and All That Comes With It

Natural Language Processing (NLP) and All That Comes With It

People don’t often think about the ambiguities that come with human language. They use language as an intuitive behavior to...
Read More
What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and...
Read More
Blockchain Smart Contracts and Supply Chain Security

Blockchain Smart Contracts and Supply Chain Security

With the ignominious demise of FTX in recent months, cryptocurrency has been much in the news of late for all...
Read More
How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the...
Read More
Revelations From CISA Proves Phishing is a Public Menace

Revelations From CISA Proves Phishing is a Public Menace

A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on...
Read More

{Latest Posts}

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…

Read More »
Fingerprints against a blue background and encrpytion symbols to represent Biometrics

Biometrics and Encryption

We know that biometrics run on comparison surgeries, where the sample is taken and that this pattern is used for confirmation and the identification of the principal. This template is known as a blueprint…

Read More »
Cloud connecting to people in tech circles, network integrity

Network Integrity

Network integrity starts with a network diagram. Actually, most things regarding technology risk should start with a network diagram. Your network is the circulatory, nervous and endocrine systems of your company. As such, it…

Read More »
Cybersecurity Vulnerabilities lock on credit card on keyboard

Cybersecurity Vulnerabilities

Cybersecurity vulnerabilities are weaknesses that allow attackers to reduce system information assurance. Sensible strategies should begin with basic knowledge of exactly what vulnerabilities may exist in your systems. Among the first steps is to…

Read More »