by Krishi Chowdary - Password manager LastPass encountered a security breach in August this year, which led to the loss of confidential technical…
by Krishi Chowdary - The largest ride-sharing company Uber suffers another data leak. Teqtivity, a third-party vendor of Uber and Uber Eats, has…
by Krishi Chowdary - The apps developed by engineers who rely on code-generating AI systems for generating code are more prone to security…
by Krishi Chowdary - The Los Angeles Housing Authority recently announced that it had been attacked by an apparent cyberattack. According to a…
by Ty Mezquita - A wave of phishing attacks has been generated within Google’s cloud-based word processing solution (Google Docs) and its “Comments”…
by Nura Eston - If you have an e-commerce shop, you know that keeping your online store safe from fraud and scams is…
by Ty Mezquita - Cybercriminals are always looking for new ways to infiltrate your devices. Recently, they’ve been using the attack vector of…
by JC Gaillard - Time to move away from bottom-up dynamics: The Board should decide on priorities and drive the discussion As we…
by Rakesh Soni - When we think about cyber attacks or data breaches, one of the first things that come to our mind…
by Ty Mezquita - Google has tried to eliminate malicious apps from its Android platform on the Google Play Store, but certain apps…
by Ayush Maskara - Illegal tax avoidance and financing terrorism are both revolting violations with economic outcomes. Money laundering endorses an underlying, profit-making…
by Ty Mezquita - Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key…
by Ty Mezquita - Security Orchestration, Automation, and Response (SOAR) is a stack of compatible software programs that enables an organization to collect…
by Ty Mezquita - Software as a Service (SaaS) applications have transformed businesses over the last decade with enormous value. SaaS solutions have…
by Nikhil Sharma - Despite the circling horror stories and successful hacking attempts, WordPress is still the biggest content management system on the…
by Ty Mezquita - The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One method of attack has been…
by JC Gaillard - CISOs being asked those questions should look beyond the topic itself and face the underlying issues it might be…
by Ty Mezquita - The US Securities and Exchange Commission (SEC) has published a “Security Incident” submitted by web services giant, GoDaddy. GoDaddy…
by Ty Mezquita - Castle-And-Moat refers to a network security model in which no one outside the network is able to access data…
by Gee Ranasinha - Part of marketing’s role has always been concerned with delivering information to people. Today, it would seem marketing is…
by Ty Mezquita - California Pizza Kitchen (CPK) founded in Beverly Hills, California in 1985, has more than 250 locations across 32 states.…
by Joydeep Bhattacharya - More and more businesses shift towards cloud technology because they want additional space to store their data or low-cost…
by Paul Dughi - I know I’m not the first to point this out, but tracking by websites is out of control. After…
by Rakesh Soni - The digital world is a web of dependencies. No wonder logging into an online account with a username and…
by Ty Mezquita - The holiday shopping season means big business for retailers around the world, but it unfortunately also means big business…
by John Rampton - Despite being around since the 1980s, security, or data, breaches have become increasingly more common at an alarming rate.…
by JC Gaillard - But are the CISOs ready for it? A comment left on one of my articles made me think: How…
by Laura Krajewski - Cybersecurity threats are increasing at alarming rates. Business Wire reports that with more remote work nearly 80% of IT…
by Shyam Oza - Cyberattacks are rampant, and they are wreaking havoc on organizations of all sizes. With the frequency of cyberattacks increasing,…
by Dave Sutton - Did you know that data breaches often result in businesses shutting down? Even if a company is thriving and…
by Daniel Burrus - It has become impossible for a single person to comprehend just how many virtual locations their personal data resides…
by Isaac Kohen - Already a significant concern before 2021, this year has revitalized cybersecurity as a top priority for every organization. Highly…