Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps
Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know
Single Sign-On: Balancing Power and Responsibility
Why it’s Time to Adopt a Risk-Based Approach to AppSec
Digital ID Proofing: Testing…Now Complete
{Latest Posts}

The Value of a Cybersecurity Degree – Should You Get One?
Here’s an alarming statistic – more than one third of people in the United States have experienced being hacked, being infected with a cyber virus, or being the victim…

WhatsUp with WhatsApp?
Over the weekend, we were alerted to a significant spike from normal baseline of Twitter links being shared in terrorists WhatsApp group channels…

Facebook Terrorist Propaganda
Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…

Mitigate the Risk – Avoiding Serious Business Software Interruptions with an Escrow Agreement
No one can deny the dire need for software in business today. Companies are becoming increasingly dependent on software that is hosted by a third party and is consequentially outside of their control. But…

End-to-End Encrypted (E2EE) Messaging Apps – New Criminal Frontier?
End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the…

Understanding Ransomware: A Brief Overview
Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…