Posts

gdpr data protection law in EU

Data Protection Laws and Cybersecurity: Mitigating the GDPR Challenge

It looks like data privacy has and will continue to be a…
Data breach on laptop with warning sign

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely…
money

3 Devastating Cyber Attacks on Banks That Show How Vulnerable Our Money Is

When it comes to online banking, there’s no room for tolerating…
dark web

Which Industry Is Most Vulnerable To Hacks?

Previously, we discussed the different industries that are…
botnet

Attack Agents and Bots

One of the critical parts of a successful DDoS attack relies…
open-sign-1309682_1280 (1) (1) (1)

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching…
sarbanes-oxley requires financial auditing and internal controls

The (Cyber Security) Fuss About Sarbanes-Oxley

In the cyber security news realm, there’s been a lot of talk…
format preserving encryption data security sample vendor

Cited by Gartner in 2016 Hype Cycle for Data Security

Listed as sample vendors for FPE and Database Encryption, Penta…
cyber security movies and popcorn with ticket stubs red and white

Top 5 Cyber Security Movies

With the rise in cyber security-related occurrences in the general…
clouds

Protect Sensitive Data within the Cloud

It’s pretty clear by now that the next frontier for online…