Blog
Faster Processors, Means Faster Threats, and Less Time to Waste
It is another example of the law of unintended consequences. What is originally deemed to be a benefit to society can also have a dark side, comprised of unforeseen circumstances and unexpected interactions between different entities. There are many examples of this. For instance, it seems natural that governments should regulate the introduction of new…
-
Casinos & Gaming – Hackers’ Favorite Targets
With the increase in online casinos, as well as the use of technology in brick-and-mortar casinos the shift towards online gambling has opened up a new world for players and cyber threats alike. Hackers see these platforms, technology, and apps as target-rich environments since they can deliver a one-two combination punch, going after a platform’s…
-
Faster Processors, Means Faster Threats, and Less Time to Waste
It is another example of the law of unintended consequences. What is originally deemed to be a benefit to society can also have a dark side, comprised of unforeseen circumstances and unexpected interactions between different entities. There are many examples of this. For instance, it seems natural that governments should regulate the introduction of new…
-
From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape
In 1986, the United States enacted a vital piece of legislation known as the Computer Fraud and Abuse Act (CFAA) to address a rise in computer-related crimes. CFAA made many computer-based offenses illegal, including hacking, computer trespassing, unauthorized access to computers and computer networks, and using computers to commit fraud or access national security information.…
-
Defending Your Email Infrastructure
Email is an incredible tool for businesses, but it’s also an equally incredible tool for threat actors, consistently remaining the most popular attack vector for hackers looking to gain access into an organization. And it’s not hard to see why. When planning an attack, the decisive question for a hacker is, “Will it be easier…
-
Why Outsourcing Cybersecurity is Essential for SMBs
According to a study at the University of Maryland (Security Magazine) in 2022, a cyber attack occurs every 39 seconds. With the exponential growth of the threat landscape, cybersecurity cannot be a part-time job. It is certainly not a side hustle. Whether you are a global corporate giant or a local SMB, cybersecurity is not…
-
AI Assistant, Friend, Foe, or Demigod?
When the telephone was first marketed, many predicted it to be a failure as it was assumed that people wouldn’t want to give others a way to bypass their front door and invade the privacy of their home. Despite the plethora of time-saving appliances and gadgets introduced and acquired over the years; people still complain…