• Strengthen Your Security Posture With MITRE ATT&CK Framework

    Strengthen Your Security Posture With MITRE ATT&CK Framework

    Those who used to watch old police detective TV shows will recall the classic scenes in which a crime victim or witness is asked to look through large binders of mug shots while sitting at a police station desk. This is because police detectives know that certain types of crimes continue to be committed by…

  • Casinos & Gaming – Hackers’ Favorite Targets

    Casinos & Gaming – Hackers’ Favorite Targets

    With the increase in online casinos, as well as the use of technology in brick-and-mortar casinos the shift towards online gambling has opened up a new world for players and cyber threats alike. Hackers see these platforms, technology, and apps as target-rich environments since they can deliver a one-two combination punch, going after a platform’s…

  • Faster Processors, Means Faster Threats, and Less Time to Waste

    Faster Processors, Means Faster Threats, and Less Time to Waste

    It is another example of the law of unintended consequences. What is originally deemed to be a benefit to society can also have a dark side, comprised of unforeseen circumstances and unexpected interactions between different entities. There are many examples of this. For instance, it seems natural that governments should regulate the introduction of new…

  • From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape

    From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape

    In 1986, the United States enacted a vital piece of legislation known as the Computer Fraud and Abuse Act (CFAA) to address a rise in computer-related crimes. CFAA made many computer-based offenses illegal, including hacking, computer trespassing, unauthorized access to computers and computer networks, and using computers to commit fraud or access national security information.…

  • Defending Your Email Infrastructure

    Defending Your Email Infrastructure

    Email is an incredible tool for businesses, but it’s also an equally incredible tool for threat actors, consistently remaining the most popular attack vector for hackers looking to gain access into an organization. And it’s not hard to see why. When planning an attack, the decisive question for a hacker is, “Will it be easier…

  • Why Outsourcing Cybersecurity is Essential for SMBs

    Why Outsourcing Cybersecurity is Essential for SMBs

    According to a study at the University of Maryland (Security Magazine) in 2022, a cyber attack occurs every 39 seconds. With the exponential growth of the threat landscape, cybersecurity cannot be a part-time job. It is certainly not a side hustle. Whether you are a global corporate giant or a local SMB, cybersecurity is not…

Loading

Sign Up for Updates