Data Breach

binary

Weakened Encryption Will Cause Compliance Chaos

There has been increasing demand from government and law enforcement in recent months for some sort of encryption backdoor. The theory–whether grounded in reality or not–is that an encryption backdoor will allow intelligence agencies to detect and prevent more terrorist […]

Weakened Encryption Will Cause Compliance Chaos Read More »

Holidays

‘Tis the season for holiday hackers

The holidays are a wonderful time of year, but ‘Tis the Season’ now has a double meaning for both holiday festivities and malicious malware scamming. Malware has been a popular topic of discussion from a movie studio’s network being hacked,

‘Tis the season for holiday hackers Read More »

binary fingerprint Cylance

The bad guys are probably already inside your network

Organizations and IT security professionals spend a lot of time focusing on guarding against external threats–building up the defensive wall that keeps internal systems and data safe from outside attackers. Those efforts are all well and good, but miss the

The bad guys are probably already inside your network Read More »

risk-based security

Risk-based security: Managing through the minefield

Cyber-attacks continue to become more innovative and sophisticated than ever before. In today’s cyber age, a company’s reputation—and the trust dynamic that exists amongst suppliers, customers and partners—has become a very real target for cybercriminals and hacktivists. The commercial, reputational

Risk-based security: Managing through the minefield Read More »

Scroll to Top