Author Details

Second US City Pays Hackers For Ransomware

A city in Florida paid $ 500,000 to the hackers after a ransomware attack. The total amount the city...

Read More
Device Control

Today, removable devices like flash drives and external hard drives help make data transport much easier. Large amounts of...

Read More
Snapdragon 855: Marriage of Sim Card & Mobile Soc?

Smart Card technology in a mobile SOC (System-On-a-Chip)? This is the newest innovation that Qualcomm, a mainstream ARM SOC...

Read More
Data Repository

What Is a Data Repository? Data is a vital component in a company’s operation. Without enough data, companies can’t...

Read More
A Hacker Nabbed After He Accidentally Drops A USB Drive

An independent investigation by the Belgian police found the suspect in a bank explosion, was linked to multiple cyber-attack...

Read More
NIST Cybersecurity Framework

The National Institute of Standards and Framework for Cyber Security Framework (CSF) was released in February 2014 in response...

Read More
Whaling Attack: Why Should CEOs Be Afraid?

Being the president of a Fortune 500 company is something many people aspire to be. The perks of the...

Read More
Implement OWASP Proactive Controls to Work

It is important for developers to write secure code, but with the broader implementation of DevOps, agility, seamless integration...

Read More
What Is Endpoint Detection and Response

On a regular business day, data constantly flow to and from a company’s network. This data flow is an...

Read More
How To Test For Anti-Malware Effectiveness

The “Ransomware Business” and the “Cryptocurrency mining epidemic” have become more and more sophisticated through the years, cybercriminals are...

Read More

Page 3 of 91

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register