Blog Image

Social Engineering, the Flaws of Human Error, and Methods to Defend from It

1301
“Hi, my name is Samuel Gills, I’m one of the lead database engineers for (insert company name here). Our database for employee identification crashed overnight and we need to verify some information to ensure...
Blog Image

The Lowest Cost & Most Effective Path to Better Cybersecurity

2427
The best and most overlooked action for robust cybersecurity might be the least expensive. Among the many challenges organizations face in 2020, cybersecurity (or the lack thereof) has dominated the news cycle. Ultra-sophisticated criminals are...
Blog Image

5 Reasons Why Poor Business Communication is a Cybersecurity Issue

1573
Communication is the lifeblood of business. Ideas won't form without collaboration, and deals don't get done without negotiation. Successful teams understand the importance of everyone being on the same page, and this "flow" won't happen...
Blog Image

Protecting Against Insider Threat: A Novel Approach

1234
Organizations struggle with insider threats to their data security. Employees planning to leave their jobs are involved in 60% of insider cybersecurity incidents and data leaks, research suggests. Whether intentional or accidental, sensitive content...
Cellphone displaying VPN logo

How to shield personal data from evil doers

1306
Digital privacy is practically a misnomer. The list of companies not hacked seems shorter than those attacked.  Dentin Waweru might not agree with the exaggeration, but cybersecurity is a concern. The software engineer and freelance...
Blog Image

The Next Era of Tech

1414
Quantum Computing. It seems like that is the BIGGEST buzzword after artificial intelligence. However, a lot of the resources I used to try to understand the concepts of quantum computing were difficult to understand quickly....
Blog Image

Cognitive Cyber Security

1897
As cyberattacks increase in scale and complexity, artificial intelligence (AI) helps resource-intensive security operations and analysts stay ahead of the threat. Artificial intelligence is changing the game by analyzing vast amounts of risk data...
Blog Image

Cybersecurity Is In Meltdown, Here’s A New Idea

1224
Despite a decade of increasing investments in cybersecurity, never have organizations been more vulnerable. New approaches and thinking are urgently needed. For many companies, the cybersecurity strategy is to spend millions on security systems and...
Blog Image

Shor’s Algorithm: the bane of RSA

2380
RSA encryption is a public-key encryption system. This means it has a public key, accessible to all, and a private key which is kept private. The public key is used for encryption, and only...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1867
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1337
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...
Blog Image

Global Trends in Fintech Technology

2106
Countries may have locked up their borders to mitigate the COVID-19 pandemic, but local and international trade must go on. Innovations such as cloud-based technology, AI, and fintech have stepped in to handle the...
Blog Image

The Futility (And Hope) Of Cybersecurity In Today’s Organizations

1894
Organizations continue to cast their unprotected and sensitive data around while spending millions on cybersecurity to keep it protected and contained. The result is a cybersecurity crisis that cripples individuals, companies and nations. One...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1512
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

Top Safety Tips to Protect Yourself From Common Craigslist Scams

1230
Online scams are thriving on e-commerce platforms as they provide various opportunities for creative and sophisticated fraudsters and cybercriminals. The popular classified advertising site, Craigslist, has not been able to escape their advances either,...
The IoT is «an interconnected environment in which all kinds of objects have a digital presence and the ability to communicate with other objects and people»

Questions and strategic objectives of the IoT

1409
The phenomenon of the Internet of Things is in full expansion, both for the multiplication of digital devices on the market and for their objective functionality and usefulness at the service of innovative and...
Machine Learning

Five Data Science and Machine Learning Trends That Will Define Job Prospects in 2020

6693
Data Science and ML have been one of the most talked-about trends in 2019 and without any surprise, they will continue to be so in 2020 as well. From shopping online, hailing rides, ordering food...
Blog Image

How PCI DSS Compliant Businesses Can Still Be Breached?

1166
The recent Verizon PCI Compliance Report highlighted that there’s a link between PCI DSS-compliant organizations and their ability to ward off cyber-attacks. Even though PCI DSS got implemented more than 12 years ago, cybercriminals...
Blog Image

Why Encryption is Critical to Everyday Life?

1704
You type in passwords almost every single day, the most basic form of encryption used in your life. Yet the question remains: how safe is that password? Well if you happen to use a...
Blog Image

One Metro NY: A Privacy Disaster, or Convenience Win?

1280
It seems like every morning brings new headlines that herald the end of our digital privacy as we know it. These stories spark outcry, worry, and -- counterintuitively -- no small amount of apathy.  The...