ciso working at business from a window

Why More Companies Are Looking for a CISO

A growing number of web and data threats has companies scrambling…
Smartest IoT devices

The 10 Smartest IoT Devices to Look Out For in 2017

According to Gartner, we should expect to see 8.4 billion…
1484806777641_1_111339 (1) (1) (1)

The Blockchain Hype

With technology advances a-plenty – what’s going to be…
DDos types include volumed based, protocol, and application layer attacks

Types of DDoS Attacks: General Breakdown

When major cyber attacks are made public, we often hear about…
six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

 These days it’s easy to look at the mountain of cyber…
blog-cover-image

Tax Season: Cyber Security Defenses to Make (and Keep) Your Returns

It’s that time of year again – the time of the year where…
Data breach on laptop with warning sign

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely…
hearts on valentine's day

Love in All the Wrong Places: the Dangers of Online Dating

As February 14th creeps closer, hype over finding a valentine…
Penta given Data Privacy Day Champion badge

Online Safety Tips from Penta Security, 2017 Data Privacy Day Champion

A Data Privacy Day Champion this year, Penta Security believes…
money

3 Devastating Cyber Attacks on Banks That Show How Vulnerable Our Money Is

When it comes to online banking, there’s no room for tolerating…