Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...


AI and IoT are bringing exciting new advancements, not just for ordinary folks, but for hackers as well. As malicious entities try to...


Companies face many risks when it comes to data breaches. Some occur digitally; some occur when a piece of hardware is stolen from the site...


We all want to protect our private information when browsing online, but how possible is it, really? Here we take a look at different types...


Phone hacking is a widespread problem that is expected to grow with the increasing prevalence of smartphones. Fortunately, there are many...


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no...


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at...


Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about...


Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern...


As technology continues to play an ever larger role in our lives, these threats can leave users feeling exposed.


The internet of things (IoT) is growing, and so is the data it produces. Deep packet inspection (DPI) is a method of examining that data in...


Businesses are increasingly turning to public cloud options, but is that the right choice for your data? Learn about 6 of the biggest risks...


Passive biometrics is the use of biometric identity verification without the need for any user input. This can greatly improve security by...


On Facebook, not everything is as it seems. No matter how many friends you have, enemies may be lurking there as well.


Data security is more important than ever, and encryption is one of the primary methods of securing data. Here we discuss some best...


Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think.


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...