A stock image that illustrates the concept of exploring a cyber security career path

6 Engaging & Lucrative Cyber Security Career Paths

It’s no secret that the cybersecurity industry is a job seeker’s market. This article explores half a dozen of the most popular cyber security career paths to see what opportunities... The post ...
A stock image of a login screen

Latest T-Mobile Attack Underscores Value of PKI Authentication

The teenage hacker group LAPSUS$ used stolen or purchased passwords to infiltrate T-Mobile’s systems multiple times in March 2022. This goes to show why companies can no longer rely on... The post ...
A stock image of a password written on a sticky note that's left out in the open on a laptop

A $600,000 Reminder to Not Save Your Passwords on Post-It Notes

Data from Chainanalysis shows that $14 billion in cryptocurrency was stolen in 2021 — some of which were due to sophisticated attacks. Here’s one story that’s a pricey reminder to... The post ...
Containerization Explained

The Benefits and Challenges of Containerized Microservices

We all know that testing and deploying software is a complex and time-consuming process. Can containerized microservices help? Maybe — here’s what to know… Editor’s Note: This is a guest... The post ...
A screenshot of Google News headlines relating to data breaches

Cybercrime Will Increase — And 9 Other Obvious Cybersecurity Predictions for 2022

While cybercrime and cybersecurity are no laughing matters, many cybersecurity articles tend to state the obvious in their predictions. With this in mind, we thought it would be fun to... The post ...
A screenshot of a poorly written phishing email that was received by The SSL Store

12 Days of Phish-mas: A Festive Look at Phishing Examples

The holidays are synonymous with cold weather, good food, and spending time with family. But for cybercriminals, it’s a lucrative time of the year for phishing attacks. We’ll explore more... The post ...
A screenshot of a Spamhaus Project tweet that showcases the attacker's phony email message

Attacker Exploits FBI Website Vulnerability to Send a Hoax Email

When it comes to exploiting web and email vulnerabilities, no one — including the U.S. federal government — is impervious to cybercriminals’ attacks… Earlier this month, the U.S. Federal Bureau... The post ...
cyber insurance

5 Situations in Which Cyber Liability Insurance Would Be Helpful

Check Point Research reports that ransomware attacks increased 93% in the first half of 2021 — having cyber liability coverage can help your company recover from damages that these attacks... The post ...
cyber risk assessment

15 Things Your SMB Cybersecurity Risk Assessment Should Cover

Unsure how to protect your SMB from cybersecurity threats? We explain how an SMB cybersecurity risk assessment helps and outline the most critical areas to cover  Although some might think... The post ...
A screenshot of the FireFox browser Privacy settings that shows the tracking protection enabled for browser fingerprinting

Browser Fingerprinting: The Good, Bad & Ugly

Browser fingerprinting is a controversial user data tracking technique. On the one hand, companies like it for security. On the other, it can be a data privacy issue for users... The post ...