Blog

August 13, 2019
vulnerable Application

Protecting Sensitive data from Vulnerable Application User Interface

ProtonMail, a Swiss-based email service provider, duped a sophisticated phishing scheme against a team of journalists from Bellingcat. The cybercriminals had written an email that claimed to be from the […]
July 25, 2019
cyber threat intelligence

How Businesses can Leverage Cyber Threat Intelligence

Ransomware has become one of the most pressing and expensive cybersecurity threats in recent years. According to Cybersecurity Ventures, a ransomware attack happens every 14 seconds, resulting in damage costs […]
July 19, 2019

The Better Alternative to Single-Factor Authentication

When hackers breach a database, they take advantage of weak or stolen passwords 81% of the time. This is what led Troy Hunt to publish a new version Pwned Passwords […]
April 29, 2019
Finance

Insider Threat in Financial Sector

According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company […]
April 22, 2019
Financial Sector

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised […]
March 22, 2019
cybersecurity consulting firm

Security and Privacy Issues of Connected Medical Devices

The healthcare sector is developing more technologically advanced devices aimed at making healthcare more accurate and safer. While the goal is to accelerate the body’s capacity to heal, computer-hacking threats […]
March 15, 2019
GDPR

The link between Data Loss Prevention (DLP) and GDPR compliance

Humanity’s entrance into the Fourth Industrial Revolution has made exponential changes to how people relate with one another and with their technology. Data is easily uploaded and shared to other […]
March 4, 2019
Cloud Services

The Risks of Using Cloud Services

When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of […]
February 18, 2019
Cyber Security Assessment

The Insecurity of Facial Recognition

The monumental success of the semi-automated facial recognition traces its roots back in the Los Angeles County Sheriff’s Department in 1988. Detectives used composite drawings of suspects and ran them […]