Is Your Password in the Green? Modern Tips for Maximum Security
The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
{Latest Posts}

Mitigate the Risk – Avoiding Serious Business Software Interruptions with an Escrow Agreement
No one can deny the dire need for software in business today. Companies are becoming increasingly dependent on software that is hosted by a third party and is consequentially outside of their control. But…

End-to-End Encrypted (E2EE) Messaging Apps – New Criminal Frontier?
End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the…

Understanding Ransomware: A Brief Overview
Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…

Darknet Intelligence Secrets Revealed
Cyberattacks and data breaches are part of our day-to-day life, so much so, that people have become desensitized to these events. In every case, the customers’ compromised data recompense is “credit monitoring, free for…

Understanding the Meltdown and Spectre Scare
The latest cybersecurity scare involves a set of three exploits, two named Spectre (variants one and two) and one named Meltdown (or variant three). It is important to understand that these are not actual…

Small Business: Cybersecurity on a Budget
Since the Crime Survey for England and Wales cited cybersecurity as the most common crime in the UK for 2017, it has become clear that cybersecurity is a rapidly growing threat that requires higher…

Social Media Data Exploitation
Former data analytics contractor Christopher Wylie blew the whistle on an independent company for harvesting the Facebook information of more than 50 million people in the United States, resulting in one of the most…

Addressing the Gender Gap in the Cybersecurity Field
Cybersecurity is, and has always been a male dominated field. When the stereotypical archetype of an ethical hacker or cyber warrior pops into your head, the image conjured is usually a man in a…