Blog
7 security tips for IoT systems
March 3, 2020
0 Comment
By Brandon Vigliarolo
Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack. Security firm Kaspersky has released a report with startling statistics about IoT security, including the fact that nearly a third (28%) of companies with IoT systems faced attacks targeting internet-connected
5 reasons to consider a career in cybersecurity
March 3, 2020
0 Comment
By Amer Owaida
From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you. If you’re finishing middle school, graduating college or even thinking of switching jobs, chances are that you have given some thought to the sprawling tech industry. With cyberthreats looming large
Where IT Security Is Headed: 5 Predictions
March 2, 2020
0 Comment
By Sorell Slaymaker
Insights into mobile-only security, spear-phishing, behavior biometrics, privacy issues, and more. Great security is now the top requirement when building new applications. Here are a few of my predictions: For highly secure applications, mobile devices will become the only source for identity, authentication, and moving exceedingly sensitive information and transactions
Cyber Security Today – Wi-Fi vacuum cleaner a threat, more WordPress plugin hacks, the worst stores for unsafe Android apps
March 2, 2020
0 Comment
By Howard Solomon
Is your vacuum cleaner spying on you?Maybe, if it’s connected to the Internet.Researchers at security firm Checkmarx have been looking into several Internet-connected devices, including the Trifo Ironpie M6, one of a number of circular vacuum cleaners being sold that automatically sweeps your floors and carpets. What makes the Trifo
Exploring the cutting edge of AI in Cybersecurity
March 2, 2020
0 Comment
By Allen Bernard
As good at artificial intelligence is at spotting hidden patterns and advanced cybersecurity threats, it isn’t ready to take humans out of the loop. With the number of cybersecurity threats increasing daily, the ability of today’s cybersecurity tools and human cybersecurity teams to keep pace is being overwhelmed by an