Is it Time for a Cybersecurity Rethink?
Your doorbell rings. What’s your first reaction? Do you check your Ring or Nest camera to see who it is? Or do you just open the door and allow them direct access to your home whether you know them or …
Your doorbell rings. What’s your first reaction? Do you check your Ring or Nest camera to see who it is? Or do you just open the door and allow them direct access to your home whether you know them or …
With sports betting increasingly being moved from brick-and-mortar buildings to the online world, bookmakers face a new challenge when it comes to protecting themselves and their clients against cybersecurity attacks. Although this is not a unique problem given that every …
As a business owner, you likely understand the importance of safeguarding your company’s information. You have likely invested in some form of cybersecurity, but what exactly is it, and what can it do for your business? What is Cybersecurity? Cybersecurity …
This week HP had a briefing on their latest security report, and it wasn’t pretty, but it implies a level of weaponized cyber threats that will continue to advance at rates that could cripple commerce globally if the trend isn’t …
HP Wolf Security and the Industrialization of Cybercrime Read More »
TechSpective Podcast Episode 089 There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging as possible for threat actors, and to detect …
Rajiv Kulkarni Talks about the Malware Analysis Pipeline Read More »
Similar to how a mobile app is an application which runs on a smartphone, a web app refers to a software application that carries out a particular function using a web browser for a client. The first web applications date …
Growing Attacks Underscore the Importance of API Security Read More »
TechSpective Podcast Episode 087 In a former life, I was a network administrator and IT support manager. One of the core responsibilities was to ensure resilience and business continuity even in the event of a power outage–and that meant relying …
Barak Hadad Shares Details of TLStorm Flaws in APC UPS Devices Read More »
Modern day business transactions and interactions occur on our computers or data systems. Consequently, cybersecurity threats have emerged as one of the top threats businesses face today. True, the online space is a land of opportunities, but it is also …
TechSpective Podcast Episode 085 The Winter Olympics are taking place right now in Beijing, China. It puts the teams and athletes in a sensitive and precarious situation because China is an economic and geopolitical adversary to most of the participating …
Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics Read More »
There has been a significant increase in malicious attacks on company servers and networks this year. A report published by the Identify Theft Resource Center showed that data breaches reported in the United States from January to September 2021 have …
Largest Botnet Malware Highlights Need for Breach and Attack Simulation Read More »