MASTER YOUR FUTURE IN CYBERSECURITY
Application Security Should Be A Badge Of Honor, Not A Wall Of Shame
Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps
Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know
{Latest Posts}
Bringing Your Phone Into Work Could Cause a Data Breach
The biggest danger factor regarding remote storage is the uptick in people bringing their personal devices into work and connecting to the server…
Data Breach Hits Equifax – Sometimes a Press Release Isn’t Enough
Ever since the Facebook data breach debacle, there has been a close eye on companies regarding how they deal with data breaches. Though many examples through the past few months could serve to illustrate…
Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy
An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…
The Value of a Cybersecurity Degree – Should You Get One?
Here’s an alarming statistic – more than one third of people in the United States have experienced being hacked, being infected with a cyber virus, or being the victim…
WhatsUp with WhatsApp?
Over the weekend, we were alerted to a significant spike from normal baseline of Twitter links being shared in terrorists WhatsApp group channels…
Facebook Terrorist Propaganda
Facebook, WhatsApp, YouTube, Google, Twitter, Telegram etc.. have all been alerted (for years) to the enormous amount of extremist propaganda found on their platforms, yet they aren’t compelled to proactively monitor their platforms. Recently,…
Mitigate the Risk – Avoiding Serious Business Software Interruptions with an Escrow Agreement
No one can deny the dire need for software in business today. Companies are becoming increasingly dependent on software that is hosted by a third party and is consequentially outside of their control. But…
End-to-End Encrypted (E2EE) Messaging Apps – New Criminal Frontier?
End-to-end Encrypted (E2EE) Messaging has become the latest craze, but what does it really offer? The principle behind E2EE is that no one, not even the messaging app provider, should have access to the…