Please turn on your JavaScript for this page to function normally.
smartphone hear
Burner phones are an eavesdropping risk for international travelers

In recent years, burner phones have become an obligatory part of the international business traveler’s toolkit. But though these devices are designed to minimize the amount of …

light
Modern security product certification best practices

IT security product manufacturers are required to achieve government mandated, standards-based certifications to get their product in market. One of the most common, aptly …

network
Reach the next frontier of security automation while maintaining visibility and control

As the technologies we rely on continue to evolve, they are growing at a rate that outpaces our ability to protect them. This increasing risk potential necessitates a change …

money
Things to keep in mind when raising capital for your cybersecurity venture

Long-term business success is rarely (if ever) a result of stumbling into opportunities and making makeshift decisions. In cybersecurity, as in any other industry, one might …

Europe
Exploring the proper use of pseudonymisation related to personal data

In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …

network
How DNS filtering works and why businesses need it

The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers …

online shopping
How can financial institutions prevent shopping season fraud?

Black Friday and Cyber Monday are two of the years’ busiest shopping days. For consumers and retailers alike, it marks the beginning of the winter holiday shopping season, as …

zero
Preventing insider threats, data loss and damage through zero trust

With the proliferation of mobile devices and BYOD, ubiquitous and always available internet connectivity and the widespread use of private, public and hybrid cloud solutions, …

hand
Lateral phishing makes for dangerous waters, here’s how you can avoid getting caught in the net

As companies and consumers have become more aware of phishing, hackers have refined their techniques and are now launching a more advanced form of attack known as lateral …

geometry
When is the right time to red team?

“It takes a thief to catch a thief.” Despite being hundreds of years old, this idiom holds perfectly true for that most modern of thieves, the cybercriminal. With …

data
What financial records do companies need to keep, and for how long?

Companies generate stacks of documents and managing them correctly is crucial. It can be complicated to balance organizational requirements, employee interests, and legal …

identity theft
How to remove human error from the cyber risk equation

In attempting to fortify the enterprise’s cyber assets, we have turned much of our attention to human error. After all, the vast majority of hackers rely upon their …

Don't miss

Cybersecurity news