In 2002, the internet was ten years old but still in many ways was in its nascent stages. However, its growth had spurred the dissemination and sharing of information at…
-
-
No matter what business you’re in, one of the most important (and worrisome) aspects from a technology standpoint is keeping your data secure. Not to mention that of your customers.…
-
Sometimes the best defense is a good offense. To first do this, you need to think the way the offense of the other team thinks. In cybersecurity, this is done…
-
From banking and finance to healthcare, there’s seemingly a web or mobile application for just about every aspect of our personal and business lives. Whether it’s an individual consumer accessing…
-
Web penetration testing is an important tool that is used by security professionals to test the integrity of web-facing cyber assets and systems. Penetration testing for web services is necessary…
-
Mobile applications (apps) are everywhere. The iOS App Store is currently home to over 2.2 million apps while the Google Play store currently has more than 3.5 million apps in its…
-
When it comes to protecting your organization from cyber threats, going at it alone can be a risky proposition. While many companies have dedicated internal cybersecurity teams, the growth in…
-
Cyber security today is an existential requirement for all companies. Cyber security threats targeting key assets, personally identifiable information (PII), or with the goal of encrypting and ransoming access to…
-
In today’s cybersecurity landscape, keeping data secure isn’t just about the measures that your business or organization takes to keep hackers out. With the rise of cloud computing, software-as-a-service, and…
-
Threat intelligence monitoring is a an important tool that managed security services providers (MSSP) or remote it security service providers use as part of a comprehensive cybersecurity strategy. Despite its…