Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

Medical Devices With Exposed Vulnerabilities

5 Medical Devices with Exposed Vulnerabilities

The medical field has changed for the better, with technology allowing people to live longer and lead healthier lives with fewer health complications. Unfortunately, as medical devices become more advanced with the Internet of Things (IoT) introduced into the picture, security concerns arise. It wasn’t just the recent WannaCry ransomware attack that demonstrated the vulnerability […]

10-cyber-security-lingo

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by a particular group, usually in a specific industry or profession, and difficult for others to understand. However, within the context of cyber security, certain jargon is starting to make its way into mainstream conversation and news, hinting at the increasing importance in understanding […]

db database encryption

Debunking 5 DB Encryption Misconceptions

  Businesses handle an enormous amount of data. All of this data is stored in hundreds or even thousands of databases, so it’s impractical for a database administrator to oversee the security of these databases with only basic access control functions. Instead, businesses are realizing that data encryption is a must-have component to their existing […]

bring your own device (BYOD)

Bring Your Own Device (BYOD) Security Pitfalls

The Bring Your Own Device (BYOD) movement is gaining a strong foothold in the US with 72% of organizations already implementing BYOD or planning to do so. In the workplace, BYOD presents an attractive business model to be followed, allowing for greater flexibility and increased productivity among employees. However, there are several security risks that […]

gdpr data protection law in EU

Data Protection Laws and Cybersecurity: Mitigating the GDPR Challenge

It looks like data privacy has and will continue to be a topic of hot debate, especially when industry standards and written law regulations require compliance across the board. On May 28, 2018 the GDPR (General Data Protection Regulation), which will replace the EU Data Protection Directive, will go into effect. Banks, and other public […]

ransomware attacks in various industries

7 Industries Where Hackers Are Using Ransomware

Even before WannaCry spread throughout the world at an alarming rate, infecting millions of public and private organizations along the way, ransomware had already taken foothold across various parts of the world since 2012 and has been responsible for disrupting the everyday functions of all types of organizations in various industries. In many cases, the […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.