ethersplay_large

Hands on the Ethernaut CTF

Last week Zeppelin released their Ethereum CTF, Ethernaut. This CTF is a good introduction to discover how to interact with a blockchain and learn the basics of the smart contract vulnerabilities. The ...
Explained: blockchain technology

Explained: blockchain technology

Continuing education about cryptocurrency, we provide some insight into the technology behind blockchain and explain what makes it secure. Categories: FYI Tags: bitcoinblockchainminernodeproof of stakeproof of worksmart contracts (Read more...) The post ...
What is cryptocurrency and why do cybercriminals love it?

What is cryptocurrency and why do cybercriminals love it?

Ever stumble into a conversation about Bitcoin and wonder, "What is cryptocurrency, anyway?" Read on to learn how it works and why cybercriminals love it. Categories: FYI Tags: bitcoinblockchaincoinhivecrypto minerscryptocurrency (Read more...) ...

Preparing for the GDPR Now? Have You Missed the Boat?

We are told that the secret to success in any field is preparation, a belief so well shared it is even accompanied by a renowned and expletive warning verse known as the ...

Word Crimes Part 1 – Taking on Compliance – Statutory vs Regulatory vs Contractual Compliance

Words have meaning. Cybersecurity and IT professionals routinely abuse the terms “policy” and “standard” as if they are synonymous. The same holds true for compliance terms since these terms tend to get ...
2017-10-14_ITT.png

Weekly Cyber Risk Roundup: Kaspersky’s Alleged Espionage and SmartVista Bug Unpatched

The National Security Agency and Kaspersky Lab were once again among the week’s top trending targets due to continued reporting around Kaspersky’s alleged involvement in the 2015 theft of classified materials from ...
Blockchain

Blockchain: The Future of Digital Lending?

Blockchain is one of the more exciting – and often misunderstood – emerging technologies. It essentially offers the ability to record and track transactions in a decentralized database (often referred to as ...

Workplace Health and Safety a Vital Component of Mature Risk Management

Businesses of all types are being transformed by technology, and so are the many kinds of workplaces that support their operations. Changing business strategies and increased productivity lead to rapid changes in ...
Audit Automation is NOT all Automation

Audit Automation is NOT all Automation

Some Chief Audit Executives (CAEs) and audit managers tend to think that audit automation is a set-it-and-forget-it process. NOT. In this post, I want to expand on a problem I mentioned in ...
Man Uses BackHoe to Try to Break Into ATM

Evolution Of ATM Theft: Sledgehammers To Skimmers

Over 10 billion transactions are performed every year at ATMs, and there are over 425,000 of these cash-dispensing machines throughout the U.S. for a total of 3,000,000 used globally. ATMs hold anywhere ...
The State of Security
Loading...