Security
This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.
GDPR: Do You Know if Your Organization Needs to Comply?
Many have heard tidbits about the acronym “GDPR,” but do not understand the regulation. Surprisingly, even without locations or...
6 Tips for Securing an IoT Device
More IoT devices are constantly being released, many of which now track our whereabouts or online activities. Although incredibly...
Information Security: Understanding and Securing the New Perimeter
Instead of trying to create a wall around an entire private system, more security professionals and companies are focusing their security...
10 Quotes About Tech Privacy That'll Make You Think
Privacy in tech is growing into a pressing issue. People are rightfully concerned with how their information is stored and handled by the...
Are Hackers Using AI for Malicious Intentions?
Cybersecurity professionals are looking at AI with both enthusiasm and trepidation. It has the potential to add new layers of defense for...
Hacking Autonomous Vehicles: Is This Why We Don't Have Self-Driving Cars Yet?
When hacking occurs in a data center, the worst that can happen is a loss of data. When a self-driving car is hacked, what can happen is a...
Two-Factor Authentication: A Top Priority for HIPAA Compliance
Two-factor authentication (2FA) has become increasingly important in health care. While the technology is not mandatory under HIPAA, it has...
Remote Access Trojan Attacks on the Rise - How You Can Protect Yourself
Attackers aren’t always looking for an immediate payoff: For the first time ever, a remote access Trojan (RAT), which enables hackers to...
Hacking the IoT: Vulnerabilities and Prevention Methods
The internet of things (IoT) is connecting more and more devices every day. While this may mean enhanced convenience for consumers, it also...
How Cybercriminals Use GDPR as Leverage to Extort Companies
The General Data Protection Regulation is meant to combat a reality experienced by everyone on the internet: Data isn’t private or safe....
Can the Blockchain Be Hacked?
There’s a battery of questions related to the underlying security of the blockchain. Boiled down into a simple question: you might say –...
IT Security: What to Expect in 2019
There is so much ahead in the cybersecurity world - with AI and more, companies are evolving to meet the challenges of a connected world.
Why Businesses Need Secure Messaging That Goes Beyond Encryption
Digital communications are essential to everyday business operations, but unfortunately, the most commonly used mediums – email and SMS...
Open Source Vulnerabilities Are on the Rise: Here’s What You Need to Know
The consistent rise in open source usage, along with headline-grabbing data breaches like Equifax that exploited vulnerabilities in open...
Your Video Tech Could Be Putting Your Company at Risk
Videos can be priceless tools in your business, but if you don't protect them properly, they can also reveal priceless company secrets to...
A Look at the OWASP Top 10 Project: Protecting Your Web Apps
Numerous techniques can allow hackers access to your web apps, but what are the biggest risks? According to the Open Web Application...
How AI Advancements Are Affecting Security, Cybersecurity and Hacking
Artificial intelligence and machine learning are helping to fight crime - both digitally and in the real world. See how recent advancements...
10 Steps to Strengthen Your IoT Security
The internet of things (IoT) is growing at a rapid pace, but that means our security measures must grow as well. See what steps you can...
Distributed Networks and the Challenge of Security
Bring your own device (BYOD) has become a standard in today's workplace. However, that doesn't mean that the security issues around it have...