There’s no question that organizations (and individuals) faced many challenges in 2020, both new and familiar. Information security…
Filter by Category:
Questions Every Business Executive Must Be Asking – Cybersecurity is not Just for Technologists
For many generations our personal and business records remained private for only those who had permission to have…
How DNS Services Impact Cyber Security
Domain Name Server (DNS) spoofing and DNS poisoning are closely related forms of cyber-attack. Typically, hackers misdirect a…
Quora Discloses Data Breach Impacting 100 Million Users
Quora said today that a security breach may have compromised data from about 100 million users. In an…
Marriott announces data breach of up to 500 million Starwood guests
What happened at Marriott? Marriott disclosed that its Starwood guest reservation database, which spans W Hotels, Sheraton, Westin,…
Understanding Zero Trust Security
Understanding Insider Threat and the Zero Trust Information Security Model The decades-old concept of the hardened defensive perimeter…
There’s No One-Size-Fits-All in Cybersecurity
Are you relying on someone else’s strategy to build your cybersecurity plan? With the complexity of building a…
Why Complex Passwords Provide Weak Cyber Security in the Real World
Careless reuse of passwords by individual users is a vulnerability frequently used by hackers to exploit personal data…
Choosing the Right SIEM Solution
Choosing the Right SIEM Solution Since its inception, SIEM (security information and event management) has been something for…
PeriCertum™ Partners with Arx Nimbus to Fill Gap in Financial Cybersecurity Risk Analysis
First-of-its-kind financial cybersecurity risk profile gives organizations complete, reliable financial and regulatory visibility to their cybersecurity status. PeriCertum,…
CRYPTOJACKING – What is it? How do you identify it? How can you prevent it from impacting your organization?
Cryptojacking is mining “stealing” cryptocurrency through the unauthorized use of someone’s computer. Hackers use two methods to accomplish…
Google+ exposed data of hundreds of thousands of users
What happened at Google? A software vulnerability in the Google+ social media network gave third-party developers potential access…