AI-driven platform: To detect, hunt and investigate cyber threats

Technology advancements aim to simplify and speed up tasks for humanity. However, like any other, technology has a downside to it as well. As technology progresses, so do the means to exploit ...
information cybercriminals EO nation-state Developing Nations Cybercrime

Is Trafficking in Hacking Information a Crime?

Quincy Compton of Concord, North Carolina, had a wife and a pregnant girlfriend and wrote to a doctor in Washington, D.C. for information about terminating a pregnancy. The doctor, Thomas Kemp, wrote ...
Security Boulevard
Planning Cybersecurity and Privacy in 2022 secureflo.net

Planning Cybersecurity And Privacy in 2022

| | information
If you have been paying attention to the news recently, you have probably seen that cybersecurity breaches affect many of the world’s large well-known organizations. Small and medium firms are also getting ...

How Cyber Hackers Use Advanced Persistent Threats(APT) for Long-Term Access to a Target’s System

| | information, security
The fear of a potential data breach and the potential consequences that can ensue is an everyday nightmare for cybersecurity professionals.  Cyber attacks and threat actors have evolved tremendously during the past ...

How Cyber Hackers Use Advanced Persistent Threats(APT) for Long-Term Access to a Target’s System

| | information, security
The fear of a potential data breach and the potential consequences that can ensue is an everyday nightmare for cybersecurity professionals.  Cyber attacks and threat actors have evolved tremendously during the past ...
Cyber Hackers Use Advanced Persistent Threats(APT) for Long-Term Access to a Target’s System secureflo.net

How Cyber Hackers Use Advanced Persistent Threats (APT) for Long-Term Access to a Target’s System

| | information, security
How Cyber Hackers Use Advanced Persistent Threats (APT) for Long-Term Access to a Target’s System ? Cyber Hackers Use Advanced Persistent Threats(APT) for Long-Term Access to a Target’s System secureflo.net The fear ...
3 myths about ISO 27001 certification

3 myths about ISO 27001 certification

ISO 27001 is the international standard for an ISMS (information security management system), a best-practice approach to security that helps organisations achieve all of their data privacy compliance objectives. If you are ...
T-Mobile Suffers a Data Breach, Again

T-Mobile Suffers a Data Breach, Again

T-Mobile has begun notifying customers of a security breach that might affect an undetermined number of them, possibly revealing their names and addresses, phone numbers, account numbers, rate plans and features, and ...
IBM data breach The Economics of Data and Information

The Economics of Data and Information

According to the Economist, the world’s most valuable commodity is no longer oil, but data. This is very interesting because there was a time where mere access to information was what separated ...
Security Boulevard
Cybersecurity approaches to keep PHI safe

Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired ...