Sam Bocetta
Recent Posts
-
Triton Malware: Protecting Your Network from the Latest Threat
June 11, 2019A lot of organizations talk a good security game, but one global test and measurement consortium is…
-
How to Tell if you've Been Cryptojacked
February 07, 2019Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing…
-
Warning: Advanced Phishing Kits now Available on the Dark Web
November 16, 2018The rise of the dark web has changed many things for criminals. Long a haven for the buying and…
-
What is DNS Cache Poisoning (and How To Prevent It)
October 24, 2018Also known as DNS spoofing, DNS cache poisoning is an attack designed to locate and then exploit…
-
Coronavirus and Cybersecurity: 3 Essential Precautions for Enterprises
March 20, 2020The Coronavirus is changing everything. Amid talk of social distancing, quarantine, and stock market…
-
Don’t Underestimate the 5G Impact on Just About Everything
May 29, 2020The connectivity of the world is moving at break-neck speeds. The next evolutionary step in this…
-
Cloud Security: Top 3 Threats and How to Address Them
June 08, 2020In this article, we will identify three specific cloud security threats and what should be done to…
-
US Elections 2020: Effectively Balancing Access and Security
June 18, 2020In this piece, we’ll dive into exactly how America’s electoral integrity is at risk due to cyber…
-
Digital Contact Tracing: Advantages and Disadvantages
July 02, 2020As governments around the world continue to face the escalating crisis and come up with pandemic…
-
Hands-Free Everything? The Coronavirus Impact on IoT
July 10, 2020More sectors and industries will look to IoT going forward to entice customers, expand their brands,…
-
Spear Phishing and Coronavirus – How to Protect Yourself and Your Company
July 31, 2020Spear phishing is on the rise as cyber criminals have begun impersonating Google to trick remote…
-
ETSI's New Cybersecurity Standards Establish a Security Baseline for IoT Devices
August 11, 2020In today’s blog, we’ll cover the European Telecommunications Standards Institute’s (ETSI) new…
-
6 Tips for Keeping Your SMB Running Safely & Securely in the Wake of Coronavirus
September 25, 2020In this article, we’ll provide 6 key tips that can ensure the shift to online is seamless for all…
-
Understanding Why SSL/TLS Certificates Are Essential for Securing Mobile Applications
October 14, 2020In this article, we’ll discuss why mobile application security is so crucial today, along with…
-
Certificate Authorities: Who Are They and What Do They Do?
October 20, 2020Read on as we discuss what Certificate Authority actually means and how these organizations work to…
-
What Is Zero-Party Data and Why Is It Essential for Marketers Today?
December 07, 2020The data landscape now is completely shaken as browsers have made third-party cookies obsolete.…
-
Blockchain: Is the Cybersecurity Risk Worth the Rewards?
December 15, 2020If there’s been one new piece of technology that has made more people excited over the last decade…
-
Cybersecurity vs. Cyber Resilience: Why You Need Both for Optimum Cyber Protection
January 04, 2021Cybersecurity and cyber resilience are two strategies to safeguard sensitive information such as a…
-
Has COVID-19 Changed the Cybersecurity Industry Forever?
January 29, 2021Responding to the COVID crisis has put the cybersecurity world to the test. Unfortunately, there is…
-
How to Retain Paying Customers by Improving Your Checkout Security Processes
February 05, 2021Check out these tips for eCommerce stores looking to create a safer online payment experience for…
-
What You Need to Know About Cryptography and How It Will Influence IT Security In 2021
February 11, 2021Remote companies can greatly improve their security and enjoy lower operating costs through…
-
Privacy with Personality: The Trend Towards Online Pseudonymity
February 18, 2021It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we…