3 Reasons Cybersecurity Professionals Should Read 'The President is Missing'
3A new thriller recently hit the market, co-written by James Patterson and Bill Clinton. The President is Missing: A Novel is a...
User heartbeat-another potential biometric candidate
There has and always will be data of a sensitive and confidential nature throughout the business. This has and will continue to take...
Connectivity Continues
Most items the public comes in contact with are connected in some form or another. This could be one of the myriad of IoT devices (e.g....
Phishing and Medical Records: Not a Great Combination
Over the last few years, there have been many breaches involving hospitals, doctor’s offices, and other institutions securing medical...
Top Shelf Retailers are Not Immune from Breaches
Attackers are not going to go through the effort of researching and conducting recon on a target, attempting various techniques to...
Android Targeted ... Again!
Cell phones have become an integral part of our daily lives in America. If you forget your phone at home, and remember on the way to...
Cybercrime as an economy not just as a business
A recent study sponsored by Bromium, takes the position that cybercrime is no longer just a business, following corporate business...
Another Restaurant targeted
The attackers are spending a predominant amount of their time looking for new targets and completing recon on these, in order to...
Insider Threats: Still Not Cheap
The insider threat is a completely viable attack vector, be this an intentional or unintentional act. In a not significant level, there...
InfoSec Apathy: Spreading
InfoSec Apathy: SpreaWe live in such a wonderful era. The technology is growing in complexity exponentially. Moore’s Law seems to be...