Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
The Use of Generative AI in DevOps
6 Signs You Need to Improve Your Enterprise Security
Left Shifting Mobile Security with DevSecOps
{Latest Posts}

Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy
An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…

The Value of a Cybersecurity Degree – Should You Get One?
Here’s an alarming statistic – more than one third of people in the United States have experienced being hacked, being infected with a cyber virus, or being the victim…

WhatsUp with WhatsApp?
Over the weekend, we were alerted to a significant spike from normal baseline of Twitter links being shared in terrorists WhatsApp group channels…

Facebook Terrorist Propaganda
Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…

Mitigate the Risk – Avoiding Serious Business Software Interruptions with an Escrow Agreement
No one can deny the dire need for software in business today. Companies are becoming increasingly dependent on software that is hosted by a third party and is consequentially outside of their control. But…

End-to-End Encrypted (E2EE) Messaging Apps – New Criminal Frontier?
End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the…

Understanding Ransomware: A Brief Overview
Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…

Darknet Intelligence Secrets Revealed
Cyberattacks and data breaches are part of our day-to-day life, so much so, that people have become desensitized to these events. In every case, the customers’ compromised data recompense is “credit monitoring, free for…