Posts

sarbanes-oxley requires financial auditing and internal controls

The (Cyber Security) Fuss About Sarbanes-Oxley

In the cyber security news realm, there’s been a lot of talk…
profile

Buffer Overflow, a Common Attack

Data can exceed a buffer’s capacity. Not many people may know…
profile

Why Hack Pokemon Go? The Saga Continues...

When Pokemon Go launched a few weeks ago, I thought back to…
ddos attack net of thieves over a computer desk

XSS: The Con-Artist

“XSS” is an acronym you hear often in the field of information…
Boy Programming On Computer With Multiple Monitors And Laptop On Desk

What's a Zero-Day Attack?

Zero-day attack, as cool as it may sound, is one of the most…
employee using laptop and coding injection

Web Vulnerabilities 101: What's SQL Injection?

If you're familiar with the digital or cyber world at all, you…
credit-card-1591492_640

Cyber Attacks on Banks: How Vulnerable is Your Money?

When it comes to online banking, there’s no room for tolerating…
stairs-1229149_1920

Database Encryption: the new trend?

We’ve talked quite a bit about database encryption in this…
stairs-1229149_1920

Website Defacement - What is it?

Website defacement is hard to imagine but visualize this —you…
employee using laptop and coding injection

Web Security: Why Does It Matter?

Once upon a time, to access the web we had to have access to…