Zero-day attacks: Protections, best practices and how to implement them

Introduction Zero-day attacks are one of the most dangerous cybersecurity threats. This type of cyberattack targets software vulnerabilities previously unknown to software or antivirus vendors,…
Go on to the site to read the full article
The post Zer… Continue reading Zero-day attacks: Protections, best practices and how to implement them

What companies need to know about proposed changes to the Gramm-Leach-Bliley Act

Introduction: What is the Gramm-Leach-Bliley Act (GLBA)? Also called the Financial Modernization Act of 1999, GLBA governs the way in which financial institutions must prevent the disclosure of…
Go on to the site to read the full article
The post Wha… Continue reading What companies need to know about proposed changes to the Gramm-Leach-Bliley Act

4 predictions for 2020: Looking into the regulatory crystal ball

Introduction Moving into the second month of 2020, data privacy and security is still headline news. At the end of January, the United Nations called for additional investigations into the Jeff Bezos…
Go on to the site to read the full article
The po… Continue reading 4 predictions for 2020: Looking into the regulatory crystal ball

Top cybersecurity lessons for e-commerce website administrators

Introduction In 2018, card-skimming malware targeting Magento-based online stores resulted in the infection of 7,339 e-commerce sites. Any customer entering card details into the site then had those…
Go on to the site to read the full article
The pos… Continue reading Top cybersecurity lessons for e-commerce website administrators