Posts

sustainable-transport

Sustainable Transport in Data-Reliant Cities

Now that today’s megacities seem to be reaching the tipping…
Digital Waves

Uncovering Threats to Data Integrity Embedded in AI

AI and IoT integrations in intelligent transport systems, smart…
ev charging vulnerabilities

What Smart Grid Security Vulnerabilities Could Mean for the Energy Sector

Five years ago, Ofer Shezaf, founder of OWASP Israel, shared…
ssl-step-by-step-investigating

SSL-Ready? How to check your SSL settings, step by step

We all know how important SSL is, and in the slew of security…
security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
aep (advanced endpoint protection)

What is AEP (Advanced Endpoint Protection)?

Although they were once considered reliable and accessible,…
session replay attacks-2

What Are Session Replay Attacks?

According to Bleeping Computer, 483 of Alexa’s top 50,000…
cryptocurrencies and cybercrimes

How Cryptocurrencies Fuel Cybercrimes

There are many benefits to cryptocurrencies — they’re…
hacker data breaches alarm

4 Big Data Breaches That Are Only Now Being Revealed in 2017

Many were shocked to find out that major consumer credit…
critical infrastructure and IoT

Critical Infrastructure, IoT, and Security

Thanks to the rapid growth and evolution of the Internet…