Posts

Ransomware (L)

How to Defend Against Double Extortion Ransomware Attacks

Ransomware has become the most prominent cybersecurity threat…
Old Blog Banners (1000 x 571)

Two Years Into GDPR, a Flashback of the Seven Biggest Fines

May 25 marked the 2nd anniversary since the world’s strictest…
data transmission

More than Just Data: The 4th Industrial Revolution

Prior to the US presidential election back in 2016, most of the…
Anonymous

What Is Personal Data? Differences Between Pseudonymization, Anonymization, and Data Encryption

Despite the silent yet aggressive spread of COVID-19, most countries…
COVID-19

How Are Technologies Used to Fight Against COVID-19? How Secure Are They?

Four months into the outbreak, COVID-19 shows no sign of dying…
SW Zoom
Security weekly

[Security Weekly] Get ready! Time to Brace for Cyberattacks from Iran

3rd Week of January 2020  1. U.S. Government and experts…
Cryptocurrency Wallet

There’s No ‘Currency’ in Your Cryptocurrency Wallet: Part 1

What is a Cryptocurrency Wallet?  In our day to day…
ZERO TRUST

'Zero Trust', the 4 Concrete How-Tos

 ‘Zero Trust’ is quite the thing in the IT world.…
3 key features of enterprise encryption

Enterprise Encryption: 3 Key Features for Robust Security

Looking to secure corporate assets? From the technical reliability…