previous arrow
next arrow
Slider

Blog

By Tamal Nandi

In the times of Covid, as technologies disrupt most industries, cyber security is also on the path of transformation. As technology evolves, the adversaries are also enhancing their attack methods, tools, and techniques to exploit individuals and organizations. There’s no doubt that Artificial Intelligence is incredibly useful, but it is

By Robert Lemos

The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers. Three standards for email security that are supposed to verify the source of a message have critical implementation differences that could allow attackers to send

By Chris Collard

For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud

By Anshul Garg

Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen

By Adrian Zmudzinski

According to Pavol Luptak, “cryptocurrencies or crypto markets may undermine government laws and regulations that are obsolete for the 21st digital century.” Cryptocurrencies may render some outdated regulations obsolete, according to crypto-anarchist and white hat hacker Pavol Luptak. According to Luptak, “cryptocurrencies or crypto markets may undermine government laws and

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.