August 24, 2022
In this article, we'll share fifteen web hosting security best practices that you can implement to help keep your site safe and secure.
August 19, 2022
Oops! Cyber criminals hack the wrong water company, how a teenager RickRolled his high school district, Janet Jackson music video declared a security vulnerability
August 19, 2022
Botnet attacks occur when a group of internet-enabled devices on the same network are taken over by malware. When your robot network (“botnet”) is controlled by a bad actor, they can use it to launch…
August 18, 2022
Operations teams have availability as a priority, whereas security teams are solely focused on creating a secure environment. As a result, there is often conflict between operations and security.…
August 17, 2022
As the saying goes, "people are your most important asset." This is especially true in the field of information technology (IT), where a company's ability to hire and retain top talent can be the…
August 12, 2022
The UK feeling pained following a ransomware attack on the NHS, 18 tech & cyber companies launch new security standard for sharing cybersecurity information
August 08, 2022
Ransomware attacks impacted 66% of businesses in the past year – a nearly 80% increase from last year. For cybersecurity professionals, understanding the ins and outs of PKI can help them bolster…
August 05, 2022
We have researched all cookie consent plugins available on WordPress's marketplace and compiled a list of the top 10 plugins for cookie consent.
August 04, 2022
Let’s talk about what exactly NetOps, DevOps, NetSecOps, and DevSecOps are and how these combined IT approaches are changing how teams work and develop.
July 29, 2022
A 2020 data breach at the U.S. federal court system is revealed and it's of "significant concern", Uber's former head of security is in hot water, did "The Devil" swipe info of 5.4m Twitter users?
July 28, 2022
All industries are looking for safety and security for their data, the demand for cybersecurity is increasing. We discuss information regarding cybersecurity certification and as a career choice.
July 22, 2022
Albanian government services suffer a ‘massive’ cyber attack, LinkedIn remains the most impersonated brand and favorite of phishing attacks, How Conti ransomware hacked and encrypted the Costa Rican…
July 20, 2022
All online merchants will encounter challenges, and only those who solve problems creatively survive - the eCommerce world is cutthroat. In this article, we’ll be running through the top worst-case…
July 19, 2022
This initial release of ACME Service will provision Domain Validated (DV) SSL/TLS certificates for our customers and represents a key step in automating SSL/TLS lifecycles and an innovative strategy…
July 15, 2022
Honda Admits Hackers Can Unlock Car Doors, Start Engines of certain vehicles, Hackers pose as Angela Merkel to target ECB President Christine Lagarde
- November 30, 2022
- Michelle Davidson
Through new standards and proposed legislation we will see connected devices become more secure and resilient to cybercrime. Learn more
- December 09, 2022
- Amy Krigman
Apple introduces advanced data protection for iCloud, Chinese hackers stole U.S. COVID relief funds, Rackspace was hit by a ransomware attack and…