previous arrow
next arrow
Slider

Blog

By Robert Lemos

The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers. Three standards for email security that are supposed to verify the source of a message have critical implementation differences that could allow attackers to send

By Chris Collard

For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud

By Anshul Garg

Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen

By Adrian Zmudzinski

According to Pavol Luptak, “cryptocurrencies or crypto markets may undermine government laws and regulations that are obsolete for the 21st digital century.” Cryptocurrencies may render some outdated regulations obsolete, according to crypto-anarchist and white hat hacker Pavol Luptak. According to Luptak, “cryptocurrencies or crypto markets may undermine government laws and

By Monica Verma

How does cybersecurity support business and society? The pandemic shows us. There is absolutely no absolute security. Nature is designed in a way that things can and eventually will go wrong. This is true both for pandemics and cybersecurity incidents. The world wasn’t fully prepared for a pandemic like COVID-19.

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.