Latest Blog Posts
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
January 04, 2019 Added by:Steve Durbin
Four security topics businesses should focus on in 2019.
Comments (0)
Unlocking the Power of Biometric Authentication with Behavior Analytics
January 04, 2019 Added by:Jackson Shaw
As biometrics continues to gain popularity in the authentication world, it’s important to keep in mind that multi-factor authentication is critical and behavior biometrics alone are not enough to fully protect your business.
Comments (0)
Cybercriminals Hide Malware Commands in Malicious Memes
January 03, 2019 Added by:Ionut Arghire
Trend Micro security researchers have discovered a new piece of malware that receives commands via malicious memes its operators published on Twitter.
Comments (0)
Miori IoT Botnet Targets Vulnerability in ThinkPHP
January 03, 2019 Added by:Ionut Arghire
A recent variant of the Mirai botnet is targeting a remote code execution (RCE) vulnerability in the ThinkPHP framework, Trend Micro security researchers warn.
Comments (0)
2019, The Year Ahead in Cloud Security
January 02, 2019 Added by:Peter Martini
In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.
Comments (0)
The End (of 2018) Is Near: Looking Back for Optimism
December 31, 2018 Added by:James Lee
While we wait to see if 2018 is a one-off or a movement, let’s look at what to expect in 2019.
Comments (0)
IT security Predictions for 2019 – Verifying Trust
December 19, 2018 Added by:Scott Gordon
With moves towards Hybrid IT adoption showing no signs of slowing down, 2019 will be the year when Zero Trust and Software Defined Perimeter take shape!
Comments (0)
Vote for Blockchain [Voting]
December 19, 2018 Added by:George Levy
The current voting system is ripe for change and blockchain will likely play a large role in the evolution of our electoral processes.
Comments (0)
Conflicted External Auditors at Heart of Equifax Data Breach
December 13, 2018 Added by:Christopher Paris
Equifax hired financial auditors and IT security auditors from different divisions of Ernst & Young, creating conflicts of interest that may have disincentivized both auditing teams from reporting problems that eventually led to the company’s 2017 data breach.
Comments (0)
Chrome 71 Patches 43 Vulnerabilities
December 07, 2018 Added by:Ionut Arghire
Google has released Chrome 71 to the stable channel with 43 security fixes inside, as well as with a series of additional protections to improve the overall user experience.
Comments (0)
Trojan Horses for the Mind
December 07, 2018 Added by:Perry Carpenter
When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.
Comments (0)
5 Cybersecurity Predictions for 2019
December 04, 2018 Added by:Joseph Carson
The year is coming to a close. Therefore, it is important to analyze developing trends and prepare for the ever-changing threat landscape.
Comments (0)
OceanLotus Targets Southeast Asia in New Watering Hole Campaign
December 03, 2018 Added by:Ionut Arghire
A cyber-espionage group believed to be operating out of Vietnam has compromised over 20 websites as part of a watering hole campaign targeting users in Southeast Asia, ESET reports.
Comments (0)
Securing the BYoD Workplace
November 28, 2018 Added by:Scott Gordon
A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.
Comments (0)
Cyber Security Lessons from Abroad – Australia’s Essential Eight
November 28, 2018 Added by:Kevin Alexandra
Whitelisting applications and restricting administrative privileges play important roles in helping organisations identify vulnerable assets and set appropriate defences for their networks and applications.
Comments (0)
Will We Get a GDPR for the IoT?
November 28, 2018 Added by:Scott Gordon
It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.