Modern Authentication Methods and How They Enhance User Security

It’s not a secret that modern apps often become a target of cyberattacks. Gartner reports that 95% of web applications experience attacks because of stolen user passwords. This means a set of symbols is no longer a reliable way of…Read more
The… Continue reading Modern Authentication Methods and How They Enhance User Security

How Is GDPR Creating Better Career Opportunities in Cybersecurity?

Are you one of those infosec professionals looking for a change? Well, this article is for you to explore a new and flourishing career in cybersecurity. This is the best time to challenge your IT skills and specialize in the…Read more
The post How Is… Continue reading How Is GDPR Creating Better Career Opportunities in Cybersecurity?

Security in Open Source Software Isn’t Automatic – but It Should Be

Over the past few years companies have been increasing their use of open source code to help them build more powerful applications faster. Open source components cut down application development time by providing powerful features that developers do no… Continue reading Security in Open Source Software Isn’t Automatic – but It Should Be

Six Tools to Maximize Cyber Threat Prevention

Today’s web hackers are ever more advanced and are working hard to come up with new techniques and weapons to infiltrate networks. As attacks get more sophisticated, security providers are responding to these evolving threats. There are a lot of…. Continue reading Six Tools to Maximize Cyber Threat Prevention

Endpoint Attacks and Medical Management

Endpoint attacks on medical management has become common today. Learn about some tips that can help you increase the security on such devices. Ponemon recently created a report in which they demonstrated how attacks on the healthcare industry aren&#821… Continue reading Endpoint Attacks and Medical Management

A Must-Read Cybersecurity Guide for Small to Medium-Sized Businesses

Cybersecurity is crucial for all businesses, regardless of their size. As a small to medium-sized business owner, you can’t assume hackers have nothing to steal from you. In fact, hackers could be targeting you just because your business is easil… Continue reading A Must-Read Cybersecurity Guide for Small to Medium-Sized Businesses

5 Tips for Implementing a Secure BYOD Policy

BYOD (bring your own device) is quickly becoming the workplace standard. Today, 82 percent of companies allow employees to use personal devices for work, and that number will only grow. But before you turn your employees loose with their smartphones…… Continue reading 5 Tips for Implementing a Secure BYOD Policy

Smart Home Assistants: Masters of Convenience or a Security Nightmare?

Smart assistants, such as Amazon Echo or Google Home, are changing habits and making lives of more than 45 million users in the US more organized. Virtual home assistants may look like stylish music speakers matching your home interior. But…Read more… Continue reading Smart Home Assistants: Masters of Convenience or a Security Nightmare?

The Ransomware Economy in a Nutshell: Small Investments, Huge Profits

2017 was a year of increasing menace for ransomware, its first real breakthrough year found it on the front-pages of mainstream media as well as highbrow IT publications. The rapid ascension of WannaCry, GoldenEye, NotPetya led to heightened apprehensi… Continue reading The Ransomware Economy in a Nutshell: Small Investments, Huge Profits

Low fines for charities misusing donors’ data was ‘a masterstroke’

When 13 charities including two leading animal welfare organisations were given what looked like very low fines for serious data breaches, many were outraged – but it increasingly looks like a very smart move by the regulator Continue reading Low fines for charities misusing donors’ data was ‘a masterstroke’