Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

3D rendering Central Computer Processors CPU concept. Electronic engineer of computer technology. Computer board chip circuit cpu core. Hardware concept electronic device motherboard semiconductor

Non-Malware Attacks: What They Are and How to Protect Against Them?

Non-malware attacks are on the rise. According to a study by the Ponemon Institute, 29 percent of the attacks organizations faced in 2017 were fileless. And in 2018, this number may increase up to 35 percent. So, what are non-malware attacks, how do they differ from traditional threats, why are they so dangerous, and what […]

Software Patch

How Microsoft Determines Which Bugs it Will Patch

Ever since the Spectre and Meltdown vulnerabilities were made public in January 2018, it seems like there’s been a more critical eye tracking Microsoft’s patch releases. These updates are typically pushed on the second Tuesday of every month, consisting of fixes for vulnerabilities discovered over the previous 30 days. That is, unless there’s a serious […]

Researcher examining code.

Top 10 Cybersecurity Challenges to Keep an Eye on in 2018

Ensuring cybersecurity of your business becomes a bigger challenge every year. Cybercriminals perform new attacks, exploit new vulnerabilities, and perform new attacks on a constant basis while regulatory institutions change and improve standards. Your task is to be fully prepared to face these challenges. So today, we gathered the top 10 cybersecurity hot topics you’d […]

Pop Quiz: What Do You Know About Workplace Cyber Warfare Threats?

Cyber warfare can be used for all kinds of purposes, not just the hacking of rival nation-states or political parties’ emails. Businesses and financial institutions are all fair game. To protect digital assets, which include proprietary information and sensitive personnel data, employers need to double down in this age of hacking and set up systems […]

Close-up Of Woman Looking At Baby Monitor Feed On Mobile Phone

Connected Security Devices Require Increased Oversight

According to numerous recent studies the market for internet-connected security devices is increasing and will continue to do so in the near future. There has been an increase in overseas companies, particularly in China, that are manufacturing inexpensive security products such as cameras to meet the growing consumer and business demand. These cost-effective devices are […]

Man in Data Center

Encryption Vulnerability Discovered on AMD’s Updated EPYC Processors

Semiconductor manufacturer Advanced Micro Devices (AMD) has spent much of its history chasing its well-established competitor Intel, which was seen as making a superior product. While a great deal of virtual ink has been spilled in this debate over the years, at least on the personal computing side, it was as close to indisputable as […]

Parent and child using tablet

Data Privacy Advocates Eyeing November Ballot Initiative in California

It’s been a very big year for discussing the privacy rights of technology users, with the ongoing coverage of Facebook, Cambridge Analytica, and the never-ending cycle of corporate data breaches. While the European Union’s General Data Protection Regulation (GDPR) was well ahead of the curve, it seems that one privacy advocate group timed a proposed […]