Sam Bocetta
Recent Posts
-
How IoT Has Continued To Evolve in the Post-Pandemic Market
April 12, 2023It has been over 3 years since the pandemic accelerated technological developments and sparked new…
-
Zero Trust vs. VPN: Is One More Secure Than The Other For Remote Work?
March 27, 2023In this article, we look take a look at whether zero trust or VPNs are more secure for remote work.
-
6 Medical Devices Hackers Like to Target and Why
January 12, 2023Every industry is now at constant risk of a data breach, or criminals accessing their network and…
-
Aviation Starting to Get Hit with Rise of Cyberattacks Post-Pandemic
November 21, 2022Threat actors are turning their attention to the aviation industry post-pandemic, but what…
-
The Risk of Cybersecurity Threats Continues To Grow for the Auto Industry
November 14, 2022Discover the latest innovations driving the risk of cyberattacks in the auto industry, plus the…
-
Preventing Data Breaches: 10 Tactics Every Company Should Implement
October 05, 2022Preventing data breaches is key to ensuring your business is protected. With the average cost of a…
-
What Is Password Salting and How It Can Secure Your Secrets
September 23, 2022Password salting is an essential part of increasing your database security. Read more about password…
-
Resolving the Conflict Between Availability and Security in IT
August 18, 2022Operations teams have availability as a priority, whereas security teams are solely focused on…
-
Everything You Need to Know About NetOps, DevOps, NetSecOps, and DevSecOps
August 04, 2022Let’s talk about what exactly NetOps, DevOps, NetSecOps, and DevSecOps are and how these combined IT…
-
Why mTLS Should Be Everywhere in Kubernetes and Not Just Entry and Exit
May 31, 2022There are many steps companies can take to secure their Kubernetes workloads. One best practice that…
-
Quantum Resistant Encryption: What is it & Why It’s Critical to Future Cybersecurity
May 12, 2022Quantum computers are advancing quickly. Posing a great risk in the future as they will allow…
-
How to Use and Automate PKI in DevOps?
April 05, 2022PKI is one of the most reliable security authentication tools. But how do we streamline and…
-
How to Navigate Multiple Data Privacy Regulatory Frameworks
January 11, 2022The majority of countries have adopted some form of legislation regarding data protection, which is…
-
Hacked Toys: The New Christmas Threat
December 09, 2021While consumers always run the risk of purchasing holiday gifts that are unwanted, interconnected…
-
You Could Be Competing With Bots To Buy Gifts This Christmas
December 07, 2021The holiday season has consumers eyeing the latest and greatest deals on gifts. In 2021, though, it…
-
5 Lessons for Automating Certificate Management Due to the Heartbleed Vulnerability
November 10, 2021The question remains, "What can we learn about certificate management in a post-Heartbleed world?
-
The Quantum Question: What Your Organization Should Know
October 28, 2021Let’s look at what quantum computing is, how it affects security, and who needs to be paying…
-
How Businesses Can Embrace Automation in Their Data Privacy Practices
September 09, 2021Now more than ever, businesses rely on data and technology to scale their operations. But with the…
-
GDPR: What Cloud Service Providers Should Know
July 30, 2021The appeal of cloud services makes it all the more important for these providers to understand how…
-
How the Growing Number of EU Regulations Are Impacting Businesses Worldwide
July 12, 2021Let’s take a quick dive into the current state of data privacy regulations in the EU and how it’s…
-
3 Types of Threat Actors Your Business Needs to Be Prepared For
April 27, 2021Let's face it: These days, just about all of us rely on technology to send and receive information.…
-
Is There Really Such a Thing as Ethical Hacking?
March 01, 2021Let's face it. To beat a malicious hacker, you must think like one. In this article, we discuss how…
-
Privacy with Personality: The Trend Towards Online Pseudonymity
February 18, 2021It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we…
-
What You Need to Know About Cryptography and How It Will Influence IT Security In 2021
February 11, 2021Remote companies can greatly improve their security and enjoy lower operating costs through…
-
How to Retain Paying Customers by Improving Your Checkout Security Processes
February 05, 2021Check out these tips for eCommerce stores looking to create a safer online payment experience for…
-
Has COVID-19 Changed the Cybersecurity Industry Forever?
January 29, 2021Responding to the COVID crisis has put the cybersecurity world to the test. Unfortunately, there is…
-
Cybersecurity vs. Cyber Resilience: Why You Need Both for Optimum Cyber Protection
January 04, 2021Cybersecurity and cyber resilience are two strategies to safeguard sensitive information such as a…
-
Blockchain: Is the Cybersecurity Risk Worth the Rewards?
December 15, 2020If there’s been one new piece of technology that has made more people excited over the last decade…
-
What Is Zero-Party Data and Why Is It Essential for Marketers Today?
December 07, 2020The data landscape now is completely shaken as browsers have made third-party cookies obsolete.…
-
Certificate Authorities: Who Are They and What Do They Do?
October 20, 2020Read on as we discuss what Certificate Authority actually means and how these organizations work to…
-
Understanding Why SSL/TLS Certificates Are Essential for Securing Mobile Applications
October 14, 2020In this article, we’ll discuss why mobile application security is so crucial today, along with…
-
6 Tips for Keeping Your SMB Running Safely & Securely in the Wake of Coronavirus
September 25, 2020In this article, we’ll provide 6 key tips that can ensure the shift to online is seamless for all…
-
ETSI's New Cybersecurity Standards Establish a Security Baseline for IoT Devices
August 11, 2020In today’s blog, we’ll cover the European Telecommunications Standards Institute’s (ETSI) new…
-
Spear Phishing and Coronavirus – How to Protect Yourself and Your Company
July 31, 2020Spear phishing is on the rise as cyber criminals have begun impersonating Google to trick remote…
-
Hands-Free Everything? The Coronavirus Impact on IoT
July 10, 2020More sectors and industries will look to IoT going forward to entice customers, expand their brands,…
-
Digital Contact Tracing: Advantages and Disadvantages
July 02, 2020As governments around the world continue to face the escalating crisis and come up with pandemic…
-
US Elections 2020: Effectively Balancing Access and Security
June 18, 2020In this piece, we’ll dive into exactly how America’s electoral integrity is at risk due to cyber…
-
Cloud Security: Top 3 Threats and How to Address Them
June 08, 2020In this article, we will identify three specific cloud security threats and what should be done to…
-
Don’t Underestimate the 5G Impact on Just About Everything
May 29, 2020The connectivity of the world is moving at break-neck speeds. The next evolutionary step in this…
-
Coronavirus and Cybersecurity: 3 Essential Precautions for Enterprises
March 20, 2020The Coronavirus is changing everything. Amid talk of social distancing, quarantine, and stock market…
-
Triton Malware: Protecting Your Network from the Latest Threat
June 11, 2019A lot of organizations talk a good security game, but one global test and measurement consortium is…
-
How to Tell if you've Been Cryptojacked
February 07, 2019Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing…
-
Warning: Advanced Phishing Kits now Available on the Dark Web
November 16, 2018The rise of the dark web has changed many things for criminals. Long a haven for the buying and…
-
What is DNS Cache Poisoning (and How To Prevent It)
October 24, 2018Also known as DNS spoofing, DNS cache poisoning is an attack designed to locate and then exploit…