Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

women in cybersecurity five colorful

The Women Running the Cybersecurity Industry

In 2013, Frost & Sullivan published a report that stated…
search engine magnifying glass and a lock security overlapping venn diagram

SEO and Security: Exploring the Overlaps

When it comes to a company’s website, it’s a no-brainer that…
GDPR Consent and User Data Mining

GDPR: Keeping the Value Exchange Alive

The informational world is an economy, and the content that…
Digital Waves

Uncovering Threats to Data Integrity Embedded in AI

AI and IoT integrations in intelligent transport systems, smart…
non password authentication fingerprint biometrics green turquoise

No Passwords Required? The Trends of Non-Password Authentication

In the past we’ve talked quite a bit about authentication and…
ev charging vulnerabilities

What Smart Grid Security Vulnerabilities Could Mean for the Energy Sector

Five years ago, Ofer Shezaf, founder of OWASP Israel, shared…
ssl-step-by-step-investigating

SSL-Ready? How to check your SSL settings, step by step

We all know how important SSL is, and in the slew of security…
security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
connected car data

How Valuable Is Your Connected Car Data?

This month is all about data privacy as we celebrate Data…

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.