Businesses are under immense pressure to keep their data safe, especially healthcare or financial organizations that store so much sensitive information. A slow response to a data breach can cost fines, customer trust and repair time. Here are […]
Hacktivism adds a whole new level to what we typically think of when we think of hacking. It’s more than just breaking into a device for money or data. Hacktivism goes a step further, influencing policy and methods […]
Web cache deception attacks are still a major cybersecurity issue for many popular websites. According to ZDNet, 25 of Alexa Top 5,000 websites are still impacted by these types of attacks. That number may seem small—until you understand […]
For many of us, our smartphones play a big role in our everyday lives. We use it to socialize, navigate, shop and even do our banking. It’s extremely convenient. Unfortunately, to accomplish these tasks we often share personal […]
Security Orchestration, Automation and Response (SOAR) has been getting a lot of attention recently. I thought it would be good to take a moment and discuss what it is and why it is important to the industry.
Gartner was the […]
It’s easy to pick up bad habits. Cybersecurity companies know that this is especially true when it comes to online habits. We become focused on our tasks and meetings and small security measures […]