
- January 27, 2021
- Lancen Lachance
Protect IoT Devices and Supply Chains from Emerging Threats
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain…
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain…
Smishing text message scams are not new. But it’s important to remember: they are not going to disappear any time soon. All companies should include…
Miraculously, we’ve made it through one whole week without a large-scale ransomware attack. How refreshing! Naturally, there are a few smaller-scale…
Let's explore the causes and costs to an MSP when a data breach occurs, and discuss some prevention techniques to, hopefully, mitigate the damage.
Read on as we discuss what Certificate Authority actually means and how these organizations work to keep us safe when we are on the internet.
Barnes & Noble has confirmed a cyberattack has impacted its Nook eBook reader and storage platform. To make matters worse for the US bookseller, customer data may also have been exposed.
Unfortunately, this wasn’t the first time that Magellan received bad press for a cybersecurity incident. Just under a year beforehand, they were hit by another data breach. Lessons learned? Not…
In this article, we’ll discuss why mobile application security is so crucial today, along with potential threats that should be considered in app development.
In this week's news, more than a quarter of Canadian IT workers say their company was the victim of a Covid-19 related cyber attack this year, according to a new report from the Canadian Internet…
Kicking off our new series for Cybersecurity Awareness month, we dive into the great Twitter hack of 2020. Keep reading to learn what led to the (almost) catastrophic breach and how to prevent it from…
Whether you are a developer looking for sample codes or you’re an IT administrator researching cloud-based digital signing solutions, you're covered with our brand new Digital Signing Service Resource…
It’s been a banner week for cyber attacks. Organizations such as The Swatch Group and French container shipping line magnet CMA CGM announced they’ve been impacted by attacks which took place last…
As technology continues to evolve, our lives become easier, and our businesses more efficient. That’s the good news. The bad news is that as we rely more on technology, the chances for cybercrime also…
While wild animals have been popping up in some unexpected places (due to Coronavirus), this particular story involves a potential issue with TLS. Here’s the lowdown on what you need to know and why.
Check out this excerpt from our latest white paper on how TPM 2.0 can provide manufacturers of IoT devices with more confidence in their certificate-based device authentication processes.
Our weekly blog covers the cyber attack at eyewear giant Luxottica. Plus, the Russian government looks to ban some internet protocols and technologies such as TLS 1.3.
In this article, we’ll provide 6 key tips that can ensure the shift to online is seamless for all SMBs.
It’s been another active week in cybersecurity land, starting with the news that Nvidia agreed to acquired Arm from Softbank for $40 billion. If completed, the purchase will be the largest…