Featured Articles

Lessons From Teaching Cybersecurity: Week 9

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a…

3 days ago

Aircraft maker Embraer admits hackers breached its systems and stole data

Embraer, a Brazilian manufacturer of aircraft, has disclosed that hackers managed to breach its computer systems, and steal data. Although…

3 days ago

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown…

3 days ago

A Look at the Computer Security Act of 1987

U.S. Federal Cybersecurity Today Computer security regulations have come a long way from their early beginnings.  Even before the Federal…

4 days ago

Insider Threats: Risk Assessment Considerations for Remote Work

The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift…

5 days ago

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular…

6 days ago

Suspected BEC scammers arrested in Nigeria following year-long Interpol investigation

Three men have been arrested in Nigeria, suspected of being members of an organised cybercrime gang that has targeted over…

1 week ago

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end…

1 week ago

Is Cybersecurity Smart Enough to Protect Automated Buildings?

Hacked air conditioning and plummeting elevators? Imagine that you are in an elevator in a high rise building when suddenly…

2 weeks ago

Lessons From Teaching Cybersecurity: Week 8

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a…

2 weeks ago