Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Foil the 6 Stages of a Network Intrusion

The cost of a breach is on the rise. A recent report from IBM revealed that the average cost of a data breach had risen 12 percent over the past five years to $3.92 million per incident on average. Additionally, this publication uncovered that data breaches originating from malicious digital attacks were both the most common and the most expensive types of security incidents.

Five Ways Cyber-Attackers Are Using AI to Their Advantage

Industries far and wide are raving about all of the ways that artificial intelligence can help transform the world into a more efficient and productive environment. Within cybersecurity, AI is already leaving a lasting impact. Today it is already being used to alleviate the industry's talent shortage by automating processes, increase the accuracy of alerts, minimize false positives in technology, cut down investigation times during incidents, eliminate the need for passwords, and more!

Practicing safe charging

This past June, I attended the 2019 Bitcoin Conference in San Francisco, CA. With the various discussions on Bitcoin, Cryptocurrency, and with the chance to hang out with my favorite Crypto personalities, it was easy to lose myself in all the festivities. While taking a break, I found a seat and decided to charge my iPhone. The station by where I was seated was a wooden cube with two standard wall sockets and two USB ports.

What is an SSL Certificate?

An SSL certificate (or TLS certificate) is a digital certificate that binds a cryptographic key to your organization's details. Secure Sockets Layer (SSL) are cryptographic protocols designed to encrypt communication between a server and a web browser. While SSL certificates are installed server side, there are visual cues in the browser that show SSL protection. If SSL is present you may see https:// in the address bar, a padlock, green address bar or a combination of the three.

Toyota Parts Supplier Loses $37 Million in Email Scam

Toyota Boshoku, a seating and interiors supplier for Toyota cars, has revealed that it was tricked into moving a large amount of money into a bank account controlled by scammers. In a statement published on its global website, Toyota Boshoku Corporation said that its European subsidiary was duped into transferring approximately four billion yen (over US $37 million) out of the business and into a bank account controlled by criminals on 14 August.

Cyber Risk Management Framework

Data is regarded as the most valuable asset in today’s business world. The examples of critical data include e-commerce data, e-banking data, and Personally Identifiable Information (PII). Therefore, data security is, and data breaches have become an international concern for individuals as well as organizations. The role of the Cybersecurity Risk Management Framework (RMF) in data security is indispensable.

Should small business owners concern themselves with business espionage?

As technological developments have helped turn the world into a global village, they have also made it easier to steal, extract, and communicate confidential information – leading to an increased frequency of corporate espionage. Take Apple for example; despite deploying leading security measures and monitoring activities, the tech giant has had two espionage attempts in one year, foiled just as the convicts were departing the country.

Using Symfony With ionCube Encoder

We often receive questions regarding the use of frameworks with the ionCube Encoder, and one such framework is Symfony. This article covers the most significant consideration a programmer using the Symfony framework takes in order to protect their code. Symfony not only uses the doc comments but scans the source code for “use” statements. Obviously, scanning the source code is not possible with encoded files.

To AI or Not to AI - Five Challenges Companies Face When Attempting to Embrace AI

Artificial intelligence is one of the biggest buzzwords of the year. It seems to be a much-needed answer to many woes across various industries and inherent challenges. While many are embracing the concept, others remain skeptical about the true benefit that artificial intelligence can have in businesses. No matter what side of the fence a company is on, there are some considerations to keep in mind and common mistakes to be mindful of as you embark on your AI journey.