MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary

| | MSSP
Managed Security Service Providers (MSSPs) use specialized software to monitor the environment of companies they provide services for. Security Information Event Management (SIEM) programs provide a platform for MSSPs to manage data. An MSSP might use a proprietary program they developed to manage security. Or they can use products available ... Read More
Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security

|
The Payment Card Industry (PCI) Security Standards Council has released a new alert. The alert warns of the threats of online credit card skimming to payment security. Read the full alert or get the highlights below ... Read More
5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware

| | Ransomware
Ransomware has frustrated IT professionals and end-users since the '90s. In recent months, the technique has victimized government organizations ... Read More
Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity?

|
Last week was Independence Day in the United States and Canada Day. These holidays celebrate freedom and independence. Security is a key component of independence. If a country is not secure, it is dependent on others for freedom ... Read More
Criminal vs. Ethical Hackers: Who Wins?

Criminal vs. Ethical Hackers: Who Wins?

|
When a company is ready to put their infrastructure and applications to the test, they use ethical hackers. These experts look for security gaps in a system. They use frameworks to guide their actions, like OWASP and NIST 800-115. The ethical hacker will find vulnerabilities and flaws. After these are ... Read More

The Public’s Interest in Cybersecurity

|
Much like the Internet and the rise of digital technology, cybersecurity has been a growing interest area for the past decades. A proxy to track public interest in concepts, people or anything is search queries ... Read More
Cyber Criminals Can Ruin Your Brand's Reputation

Cyber Criminals Can Ruin Your Brand’s Reputation

|
A company's brand is often its most important asset. Apple's brand is estimated to be worth over $200 billion according to Forbes. People see a brand as a promise between the consumer and company to deliver quality. Criminals use the trust built up by company's brands to deceive others. Read ... Read More
Is There Hope for a Better Password Experience?

Is There Hope for a Better Password Experience?

|
Here is a riddle: Creating new accounts means creating new passwords. To be secure, these passwords should be complex and unique. For security reasons, you should not write down your passwords. This situation means people are left with several ways to manage passwords: ... Read More
Bumper Sticker Hacking

Bumper Sticker Hacking

|
Steve Jobs drove his Mercedes without a license plate in a bid to be incognito and flaunt the rules the rest of the world follows. Ironically, the lack of a license plate made his vehicle more visible. If you saw a new silver Mercedes-Benz SL55 AMG without tags, you knew ... Read More
10 Most Secure Methods of Communication

10 Most Secure Methods of Communication

|
Communicating in a fast and modern way brings with it the possibility of privacy invasion and security concerns. Whether it be a large technology company snooping for demographic data or a government monitoring speech, communication is far from private ... Read More
Loading...