Blog

April 29, 2019
Finance

Insider Threat in Financial Sector

According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company […]
April 22, 2019
Financial Sector

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised […]
March 22, 2019
cybersecurity consulting firm

Security and Privacy Issues of Connected Medical Devices

The healthcare sector is developing more technologically advanced devices aimed at making healthcare more accurate and safer. While the goal is to accelerate the body’s capacity to heal, computer-hacking threats […]
March 15, 2019
GDPR

The link between Data Loss Prevention (DLP) and GDPR compliance

Humanity’s entrance into the Fourth Industrial Revolution has made exponential changes to how people relate with one another and with their technology. Data is easily uploaded and shared to other […]
March 4, 2019
Cloud Services

The Risks of Using Cloud Services

When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of […]
February 18, 2019
Cyber Security Assessment

The Insecurity of Facial Recognition

The monumental success of the semi-automated facial recognition traces its roots back in the Los Angeles County Sheriff’s Department in 1988. Detectives used composite drawings of suspects and ran them […]
February 12, 2019
IOT

Internet of Things and the Impact of Smart Technology on Cybersecurity

In 2015, experts declared that the fourth industrial revolution had begun in Germany and other countries. The manufacturing industry started developing smart machines to do more complex work and in […]
February 12, 2019
Cybersecurity Solutions

Automation of Cybersecurity and the Role of Virtual CISOs

2018 presented the possibilities and opportunities for cybersecurity. Unfortunately, these same technological advancements can be used for cybercrime. According to Symantec’s Internet Security Threat Report , malware and cyber threats […]
January 10, 2019
FDA

The FDA Guide: How Medical Devices Can Be Secured

Medical devices have gone from simple bandages that help wrap up wounds to MRI machines that scan the body for organ irregularities. With increasing complexity over the last five years, […]