Blog
5 Top Cybersecurity and DevOps Trends for 2020
December 9, 2019
0 Comment
By Nate Swanner
As we head into 2020, it’s clear that nothing much has changed in the cybersecurity community: threats are still very real, and the hunger for experienced security professionalsremains high. Experts suggest that the coming year’s landscape will feel very much like a continuation of 2019, as far as cybersecurity and
It’s Time for IoT Security’s Next Big Step
December 9, 2019
0 Comment
By Lily Hay Newman
Connected devices are more secure than ever. That’s still not nearly enough. THEInternet of Things security crisis has persisted for decades, producing a seemingly endless stream of under-secured consumer gadgets, corporate phones, printers, networking equipment, medical devices, and critical infrastructure sensors and controllers. By now, every industry has an IoT
By FARWA SAJJAD
Email communication even today remains a valuable tool because of its ubiquity. Organizations across various industries depend on business email as their primary means of reaching out to clients and employees as well as other stakeholders. Although cybersecurity threats can spread through various channels, attackers know they can target more
Why 5G could be a cyber security nightmare
December 6, 2019
0 Comment
By Connor Jones
If you’ve been keeping up with the headlines, you’d be forgiven for thinking the paramount concern with the security of 5G, the latest in hyperfast mobile networking technology, is the alleged threat Huawei poses to national infrastructure. But, if you speak to the experts, there are far more troubling concerns afoot. It’s not
How to protect computers that store biometric data from malware
December 5, 2019
0 Comment
By Lance Whitney
Biometrics are supposed to provide a more secure and easier way of protecting sensitive data. Using your fingerprint, your face, or your voice to sign into an account or retrieve personal information is considered a better and safer option than trying to juggle an array of passwords. Biometry-based authentication is