update to privacy policy

Notice of Privacy Policy Updates (November 2017)

Penta Security recently updated its privacy policy. Our concern…
encryption bypassed security

Bypassing Encryption Measures: The Security Implications

Law enforcement and security experts are once again at battle…
cryptocurrencies and cybercrimes

How Cryptocurrencies Fuel Cybercrimes

There are many benefits to cryptocurrencies — they’re…
hacker data breaches alarm

4 Big Data Breaches That Are Only Now Being Revealed in 2017

Many were shocked to find out that major consumer credit…
critical infrastructure and IoT

Critical Infrastructure, IoT, and Security

Thanks to the rapid growth and evolution of the Internet…
cybersecurity job shortage hiring

Today's Cybersecurity Job Challenges: Talent Shortage

This week during National Cyber Security Awareness Month,…
machine learning cyber attacks

Could Machine Learning Have a Role in Preventing Web Attacks?

In the cyber security community, there has been much debate…
common criteria cc eal

Breakdown of the Common Criteria (and How It Applies to WAFs)

The Common Criteria for Information Technology Security Evaluation,…
trickbot malware

TrickBot: The Picky Malware

It’s often assumed that malware is created to spread to…
biometrics in action

Biometrics in Action: Where Are Popular Forms of Authentication Being Used?

We’ve discussed the differences between two-factor authentication…