Posts

shocking iot security breaches

4 Shocking IoT Security Breaches of 2018

The opportunities enabled using IoT technology are vast and…
penta security muk partnership

Penta Security Partners with Ukraine-based MUK for New Market Entry

SEOUL, South Korea | Penta Security Systems Inc., a leading…
IoT devices need security

Why Your IoT Devices Need E2E Security

Talking about the era of Internet of Things (IoT), many describe…
sustainable-transport

Sustainable Transport in Data-Reliant Cities

Now that today’s megacities seem to be reaching the tipping…
Digital Waves

Uncovering Threats to Data Integrity Embedded in AI

AI and IoT integrations in intelligent transport systems, smart…
ev charging vulnerabilities

What Smart Grid Security Vulnerabilities Could Mean for the Energy Sector

Five years ago, Ofer Shezaf, founder of OWASP Israel, shared…
ssl-step-by-step-investigating

SSL-Ready? How to check your SSL settings, step by step

We all know how important SSL is, and in the slew of security…
security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
aep (advanced endpoint protection)

What is AEP (Advanced Endpoint Protection)?

Although they were once considered reliable and accessible,…
session replay attacks-2

What Are Session Replay Attacks?

According to Bleeping Computer, 483 of Alexa’s top 50,000…