How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How Much Does a Data Breach Cost? Reading the 2018 Cost of a Data Breach Study

How much does a data breach cost? It isn’t a simple question, but the answer is the only way to transmit the urgency of the situation to C-level executives. The 2018 Cost ...

Spam vs. Phishing: Definitions, Overview & Examples

Introduction Spam is usually defined as unsolicited commercial e-mail, often from someone trying to sell something. Spammers are not generally trying to get sensitive information from you, although... Go on to the ...

Who Should Pay for IT Security Training? The Employer vs. Employee Debate

Keeping abreast of the latest certifications in information technology is not easy, and there always seems to be updated revisions and new concepts to learn. This leaves many IT professionals on a ...

5 Benefits of Paying for an Employee’s Professional Certification

Introduction There are many reasons an employee may want professional certification: personal sense of achievement, an increase in salary or status, promotion, or specialized expertise with a view to... Go on to ...

How to Get Your Employer to Pay for Your IT Security Training — 10 Steps

Introduction “Who’s paying for this?” It’s an age-old question, and while it didn’t start with information technology, it certainly seems to be one of the most common questions amongst IT... Go on ...

Security vulnerabilities of cryptocurrency exchanges

| | General Security
1. Introduction Many experts argue that cryptocurrencies may radically change not only the financial sector but also the way society operates. The reasons provided to support this argument... Go on to the ...
Mirai botnet evolution since its source code is available online

Mirai botnet evolution since its source code is available online

Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functionalities and by adding new exploits ...

The EU Plans to Adopt a Cybersecurity Certification Framework

| | General Security
1. Introduction At present, there is no EU-wide certification framework that allows suppliers of ICT products to obtain information security certificates valid in all 28 EU countries. For example, if... Go on ...

And Again, About Storing Passwords

| | General Security
When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018 cybercriminals are very good ...

Personally Identifiable Information and Distributed Ledgers

| | General Security
PII (personally identifiable information) is a valuable component of every individual’s life. Governments and organizations take significant efforts to protect this data on the local and... Go on to the site to ...
Loading...