While offering incredible conveniences, mobile apps are also a vehicle for malicious hackers to obtain sensitive data and personal information. But before we dive into the work of hackers, it is important to understand user privacy.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..
This October marks the 18th annual Cybersecurity Awareness month. Over that span, cybersecurity has gone from being a topic the IT department mostly worried about, to one that is top of mind for everyone from the CEO to the receptionist at most businesses.
Pen Test Partners shared news that BrewDog exposed the details of more than 200,000 ‘Equity for Punks’ shareholders for over 18 months, along with many more customers.
Decision-makers need to strike a balance when it comes to spending on cybersecurity technology in a way that still enables corporate growth without leaving the organization overly vulnerable to an attack. Invest too little, and there could be gaps in your cyber defenses. Invest too much, and there could be a false sense of security.
The "Digital Markets: Wildlife Trafficking Hidden in Plain Sight" report from the International Fund for Animal Welfare identified over 1,100 advertisements for illegal wildlife trade and analyzed trends in the demand for and online sale of endangered species.
Let's dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace.
5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?