
- February 18, 2021
- Sam Bocetta
Privacy with Personality: The Trend Towards Online Pseudonymity
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
If you don’t have the right online security measures in place, you risk your business falling victim to an attack like whaling, which usually results…
The new year promises new innovations and trends – in many ways, it will be the start of a new era. In this article we'll walk you through the…
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
Online, the lack of information on which we normally base our trust, as well as the pressure to make a quick decision, leads to frequent errors in judgement. Those errors can be substantial – and…
The revised Payment Service Directive, most often referred to by its acronym PSD2, officially went into effect in September 2019 – although the European Banking Authority has given companies an…
The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. This article will explain what the CCPA is, who it affects, and why compliance is critical for ALL organizations.
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
The recent hack against Capital One may be one of the biggest ever in terms of the number of customers affected as well as business impact. The breach on March 22 and 23, 2019 exposed the personal…
The recent hack against Capital One may be one of the biggest ever in terms of the number of customers affected as well as business impact. The breach on March 22 and 23, 2019 exposed the personal…
Doxxing refers to someone gathering pieces of personal information and posting them online - whether on a private page or in a more public location. In many cases, the intent is to harass the person…
A division of 451 Research, the organization asked its members about their biggest security concerns. As illustrated below, the top two included user behavior and phishing. Endpoint security, the IoT…
Technology always keeps us on our toes. And while constant change and innovation is exciting, keeping up can be a double-edged sword. Perhaps the biggest challenge facing businesses today is privacy.
The ramifications of individual cybersecurity breaches can be devastating. According to a recent article in Threatpost, the average...
The ramifications of individual cybersecurity breaches can be devastating. According to a recent article in Threatpost, the average...