Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

Smartest IoT devices

The 10 Smartest IoT Devices to Look Out For in 2017

According to Gartner, we should expect to see 8.4 billion connected devices by the end of this year, a 31% increase from 2016. With an increasing number of businesses jumping on the IoT bandwagon, it seems like every day there is a new connected device out on the market. Even a simple internet search on […]

1484806777641_1_111339 (1) (1) (1)

The Blockchain Hype

With technology advances a-plenty – what’s going to be the next revolutionary technological development? Big data? The Internet of Things (IoT)? Nope. It’s going to be the blockchain With more than 25 countries investing in the technology, and $1.3 billion invested – it looks like individuals, companies, and governments alike are putting their eggs in […]

DDos types include volumed based, protocol, and application layer attacks

Types of DDoS Attacks: Explanation for the Non-Tech-Savvy

When major cyber attacks are made public, we often hear about their magnitude and strength. More often than not, the media is talking about DDoS attacks. Deloitte for example revealed that the year 2016 “saw the first two [DDoS] attacks of one terabit per second (Tbps) or more.” But what does this actually mean? One […]

six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

  These days it’s easy to look at the mountain of cyber crime news out there, and imagine a hoodie-wearing, tech-savvy loner in a dark corner of a room trying to get into a network for information. However, times have changed. It’s not just technology that changes or security measures that evolve. Hackers are also […]

blog-cover-image

Tax Season: Cyber Security Defenses to Make (and Keep) Your Returns

It’s that time of year again – the time of the year where winter coats are abandoned, flowers are in full bloom… and everyone starts to rack their brains for how to deal with their taxes from the last fiscal year. Tax season is a stressful time for most and, whether you hire an accountant […]

Data breach on laptop with warning sign

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely must disclose details of any internal breaches they may have suffered. In reality, the majority of data breaches go unreported, and details of the leak are rarely revealed to the public. Recently in the media, Yahoo came under fire and heavy scrutiny for late disclosure […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.