Blog
IoT Devices: Privacy and Security in Abusive Relationships
October 18, 2020
0 Comment
By Martijn Grooten
A few weeks, ago, technology news site The Verge reported on a new Ring security camera that is in fact a drone that flies around inside your house. Available beginning next year, the ‘Always Home Cam’ is supposed to give its owners a total view of their home without the
Data Sovereignty and Cybersecurity
October 17, 2020
0 Comment
by Kumar Ritesh
To view data sovereignty through a narrow lens may stifle progress. It would be prudent to deploy forward-thinking and progressive cyber strategies as we march into a highly digital post-pandemic world. The pre-pandemic years usher a heady era of globalization, open systems, and interconnection. Collaboration between governments and businesses resulted in
As attackers evolve their tactics, continuous cybersecurity education is a must
October 15, 2020
0 Comment
by Zeljka Zorz
As the Information Age slowly gives way to the Fourth Industrial Revolution, and the rise of IoT and IIoT, on-demand availability of computer system resources, big data and analytics, and cyber attacks aimed at business environments impact on our everyday lives, there’s an increasing need for knowledgeable cybersecurity professionals and,
The Important Difference Between Cybersecurity And Cyber Resilience (And Why You Need Both)
October 14, 2020
0 Comment
By Bernard Marr
Cyber threats like hacking, phishing, ransomware, and distributed denial-of-service (DDoS) attacks have the potential to cause enormous problems for organizations. Not only can companies suffer serious service disruption and reputational damage, but the loss of personal data can also result in huge fines from regulators. Take British Airways as an
IoT Security Concerns for the Financial Industry
October 14, 2020
0 Comment
by Roland Atoui
Any fast-growing industry can face cybersecurity threats. This comes as no surprise, considering how much we rely on technology nowadays. While certain tech breakthroughs help with efficiency and give great results, they also open the door to malicious attacks. New threats are being registered almost daily, and our security has