machine learning cyber attacks

Could Machine Learning Have a Role in Preventing Web Attacks?

In the cyber security community, there has been much debate…
common criteria cc eal

Breakdown of the Common Criteria (and How It Applies to WAFs)

The Common Criteria for Information Technology Security Evaluation,…
trickbot malware

TrickBot: The Picky Malware

It’s often assumed that malware is created to spread to…
biometrics in action

Biometrics in Action: Where Are Popular Forms of Authentication Being Used?

We’ve discussed the differences between two-factor authentication…
website security plugins limitations

The Limitations of Website Security Plugins

If you’re a website owner, you’re probably using a myriad…
iot security importance for all

Why You Should Care About IoT Security

You might not be one of the two-thirds of Americans currently…
detect and respond cybersecurity

The Flaws with Detect and Respond

There has been a lot of discussion around Detect & Respond…
Medical Devices With Exposed Vulnerabilities

5 Medical Devices with Exposed Vulnerabilities

The medical field has changed for the better, with technology…
10-cyber-security-lingo

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by…
db database encryption

Debunking 5 DB Encryption Misconceptions

Businesses handle an enormous amount of data. All of this…