Mirai Botnet
A Sign of DDoS to Come By Charles Parker, II; InfoSec Architect Attackers are always looking for new and novel methods of attack. These initially may be difficult to defend…
How to save your critical data using smart backup procedures?
By Milica D. Djekic The disasters and discontinuities in work are not rare occurrences, so we should get ready to protect our vitally significant assets from any sort of loss…
THE GLOBAL CYBER SECURITY BATTLE
LAPTOPS WILL BE THE ARTILLERY OF THE FUTURE By David J. O’Reilly, Managing Director, Hampton Court Capital Every political and military conflict now has a cybersecurity aspect to it, which…
Improve Company Cyber Security While Staying on Budget
By Maricel Tabalba Cybersecurity is a critical issue for any business owner, and modern businesses face an ever-evolving threat when it comes to keeping themselves and their customers protected. In…
IoT Devices Require Security-First Design
By Bill Graham, Technical Marketing Specialist, GrammaTech Introduction The Stuxnet malware was a wake-up call for embedded device security when it became public knowledge in 2010. Its sophistication and purpose…
Best Practices in Cyber Security for Businesses
By Tim Green Cybersecurity–information technology security–is the practice of protecting computers, applications, data, and networks from illegal access. From hacking to computer viruses, to phishing emails and calls, efficient cybersecurity…
The Myth Behind Frequent Password Changes
Are they good practice or counterproductive? By Sarosh Petkar, BS/MS Student, Computing Security – RIT INTRODUCTION Mandatory password changes are an age-old security practice within numerous organizations. This practice is…
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated…
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for…
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory…
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young…
Part I: The Anatomy of a Wi-Fi Hacker in 2019
By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they’ll spend…