Blog

September 13, 2019
cloud computing

Combatting the Security Risks of Cloud Computing

Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities.  Cloud services are making it possible for businesses to place their […]
August 13, 2019
vulnerable Application

Protecting Sensitive data from Vulnerable Application User Interface

ProtonMail, a Swiss-based email service provider, duped a sophisticated phishing scheme against a team of journalists from Bellingcat. The cybercriminals had written an email that claimed to be from the […]
July 25, 2019
cyber threat intelligence

How Businesses can Leverage Cyber Threat Intelligence

Ransomware has become one of the most pressing and expensive cybersecurity threats in recent years. According to Cybersecurity Ventures, a ransomware attack happens every 14 seconds, resulting in damage costs […]
July 19, 2019

The Better Alternative to Single-Factor Authentication

When hackers breach a database, they take advantage of weak or stolen passwords 81% of the time. This is what led Troy Hunt to publish a new version Pwned Passwords […]
May 15, 2019
Privacy and Data Protection

The Reason why Application Leaders should care about Privacy and Data Protection

As of July 2018, downloadable apps on the Apple App Store reached 3.2 million. Data shows that social media applications are the most frequently used, allowing people to connect — […]
April 29, 2019
Finance

Insider Threat in Financial Sector

According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company […]
April 22, 2019
Financial Sector

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised […]
March 22, 2019
cybersecurity consulting firm

Security and Privacy Issues of Connected Medical Devices

The healthcare sector is developing more technologically advanced devices aimed at making healthcare more accurate and safer. While the goal is to accelerate the body’s capacity to heal, computer-hacking threats […]
March 15, 2019
GDPR

The link between Data Loss Prevention (DLP) and GDPR compliance

Humanity’s entrance into the Fourth Industrial Revolution has made exponential changes to how people relate with one another and with their technology. Data is easily uploaded and shared to other […]