Blog

July 19, 2019

The Better Alternative to Single-Factor Authentication

When hackers breach a database, they take advantage of weak or stolen passwords 81% of the time. This is what led Troy Hunt to publish a new version Pwned Passwords […]
April 22, 2019
Financial Sector

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised […]
March 4, 2019
Cloud Services

The Risks of Using Cloud Services

When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of […]
November 27, 2018
Cybersecurity Solutions

An Imminent Connection: 5G and Its Cybersecurity Implications

Over the past few years, businesses have increasingly shifted towards digital customer communication and records. As efficiency and connectivity of this digitization of business has increased, so have the likelihood […]
November 1, 2018
AI

The Role of AI in Cybersecurity

Artificial intelligence (AI) and machine learning (ML) have become fundamental to cybersecurity. Artificial Intelligence has the amazing capacity for use to protect as well as to do harm.  In the […]