Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Practicing safe charging

This past June, I attended the 2019 Bitcoin Conference in San Francisco, CA. With the various discussions on Bitcoin, Cryptocurrency, and with the chance to hang out with my favorite Crypto personalities, it was easy to lose myself in all the festivities. While taking a break, I found a seat and decided to charge my iPhone. The station by where I was seated was a wooden cube with two standard wall sockets and two USB ports.

What is an SSL Certificate?

An SSL certificate (or TLS certificate) is a digital certificate that binds a cryptographic key to your organization's details. Secure Sockets Layer (SSL) are cryptographic protocols designed to encrypt communication between a server and a web browser. While SSL certificates are installed server side, there are visual cues in the browser that show SSL protection. If SSL is present you may see https:// in the address bar, a padlock, green address bar or a combination of the three.

Toyota Parts Supplier Loses $37 Million in Email Scam

Toyota Boshoku, a seating and interiors supplier for Toyota cars, has revealed that it was tricked into moving a large amount of money into a bank account controlled by scammers. In a statement published on its global website, Toyota Boshoku Corporation said that its European subsidiary was duped into transferring approximately four billion yen (over US $37 million) out of the business and into a bank account controlled by criminals on 14 August.

Cyber Risk Management Framework

Data is regarded as the most valuable asset in today’s business world. The examples of critical data include e-commerce data, e-banking data, and Personally Identifiable Information (PII). Therefore, data security is, and data breaches have become an international concern for individuals as well as organizations. The role of the Cybersecurity Risk Management Framework (RMF) in data security is indispensable.

Should small business owners concern themselves with business espionage?

As technological developments have helped turn the world into a global village, they have also made it easier to steal, extract, and communicate confidential information – leading to an increased frequency of corporate espionage. Take Apple for example; despite deploying leading security measures and monitoring activities, the tech giant has had two espionage attempts in one year, foiled just as the convicts were departing the country.

Using Symfony With ionCube Encoder

We often receive questions regarding the use of frameworks with the ionCube Encoder, and one such framework is Symfony. This article covers the most significant consideration a programmer using the Symfony framework takes in order to protect their code. Symfony not only uses the doc comments but scans the source code for “use” statements. Obviously, scanning the source code is not possible with encoded files.

To AI or Not to AI - Five Challenges Companies Face When Attempting to Embrace AI

Artificial intelligence is one of the biggest buzzwords of the year. It seems to be a much-needed answer to many woes across various industries and inherent challenges. While many are embracing the concept, others remain skeptical about the true benefit that artificial intelligence can have in businesses. No matter what side of the fence a company is on, there are some considerations to keep in mind and common mistakes to be mindful of as you embark on your AI journey.

Category 1 cyber threat for UK businesses

Britain should be prepared for a Category 1 cyber security emergency, according to the National Cyber Security Centre (NCSC). This means that national security, the economy, and even the nation’s lives will be at risk. However, despite this harsh warning, UK businesses still aren’t taking proactive and potentially preventative action to stop these attacks from happening. So just where are UK businesses going wrong and can they turn things around before it’s too late?