Blog
Cyber security startups strengthening advanced tech to deal with cyberattacks
July 24, 2020
0 Comment
By Tamal Nandi
In the times of Covid, as technologies disrupt most industries, cyber security is also on the path of transformation. As technology evolves, the adversaries are also enhancing their attack methods, tools, and techniques to exploit individuals and organizations. There’s no doubt that Artificial Intelligence is incredibly useful, but it is
By Robert Lemos
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers. Three standards for email security that are supposed to verify the source of a message have critical implementation differences that could allow attackers to send
5 Core Tenets for Effective Multicloud Security
July 24, 2020
0 Comment
By Chris Collard
For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud
By Anshul Garg
Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen
By Adrian Zmudzinski
According to Pavol Luptak, “cryptocurrencies or crypto markets may undermine government laws and regulations that are obsolete for the 21st digital century.” Cryptocurrencies may render some outdated regulations obsolete, according to crypto-anarchist and white hat hacker Pavol Luptak. According to Luptak, “cryptocurrencies or crypto markets may undermine government laws and