52 Key Cybersecurity Tips: Your Playbook for Unrivaled Security
September 15, 2020
In a world where news spreads fast…
0 Comments19 Minutes
How Employing Encryption for Data Security Changed History
September 14, 2020
Data Security Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That Data Security could involve military campaigns,…
0 Comments7 Minutes
Cyber Security Awareness Tips
September 11, 2020
Helpful tips for helping to keep your identity, personal information and data secure. More information on these topics and more can be found on the pages linked at the bottom of the page. Phishing Emails Never respond to requests for personal information via email. Businesses will never ask…
0 Comments4 Minutes
24 Essential Penetration Testing Tools
Security Audits & Penetration Testing
September 10, 2020
Penetration testing has become an essential part of the security verification process. While it’s great that there are many penetration testing tools to choose from, with so many that perform similar functions it can become confusing which tools provide you the best value for your time. We are…
0 Comments17 Minutes
Ad Hoc or Managed Penetration Testing: Which One Is Best for You?
September 9, 2020
Penetration testing is no longer an extraordinary security engagement. Due to regulatory mandates, internal policies, business executive requests and the overall desire to avoid becoming the next breach victim, testing is now commonplace among many organizations. The kind of testing, however, can…
0 Comments8 Minutes
The Modern Workplace: Keeping Remote Workers Productive and Secure
September 9, 2020
Keeping Remote Workers Productive and Secure Results from the March 30, 2020, Gartner CFO Survey indicate that 74% of businesses intend to shift some employees to permanent remote work following their initial experience responding to current global conditions. Regardless of recent world events,…
0 Comments11 Minutes
Securing Data in a Multicloud Environment
September 8, 2020
Securing Data The multicloud environment is becoming the standard for businesses, with 93% of organizations using this approach, according to a Flexera 2020 State of the Cloud report. The public cloud services used in the multicloud strategy are gaining in popularity, with Gartner…
0 Comments5 Minutes
Why Adversarial Examples Are Such a Dangerous Threat to AI Deep Learning
September 7, 2020
Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several…
0 Comments9 Minutes
DDoS Attacks Increase in Size, Frequency and Duration
September 4, 2020
Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that…
0 Comments8 Minutes
Build a Roadmap for Cyber Resilience
September 4, 2020
The current information security landscape is rapidly evolving. According to the latest research from IBM Security and the Ponemon Institute’s 2020 Cyber Resilient Organization Report, 67% of organizations reported that the volume of attacks had significantly increased over the past 12 months. It’s…
0 Comments8 Minutes