Posts

security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
aep (advanced endpoint protection)

What is AEP (Advanced Endpoint Protection)?

Although they were once considered reliable and accessible,…
session replay attacks-2

What Are Session Replay Attacks?

According to Bleeping Computer, 483 of Alexa’s top 50,000…
cryptocurrencies and cybercrimes

How Cryptocurrencies Fuel Cybercrimes

There are many benefits to cryptocurrencies — they’re…
hacker data breaches alarm

4 Big Data Breaches That Are Only Now Being Revealed in 2017

Many were shocked to find out that major consumer credit…
critical infrastructure and IoT

Critical Infrastructure, IoT, and Security

Thanks to the rapid growth and evolution of the Internet…
machine learning cyber attacks

Could Machine Learning Have a Role in Preventing Web Attacks?

In the cyber security community, there has been much debate…
trickbot malware

TrickBot: The Picky Malware

It’s often assumed that malware is created to spread to…
website security plugins limitations

The Limitations of Website Security Plugins

If you’re a website owner, you’re probably using a myriad…
10-cyber-security-lingo

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by…