Consumer Sentiments About Cybersecurity and What It Means for Your Organization Over the past six months, the data breaches against companies such as Panera Bread, Delta Airlines and Sears, and Saks… Anna Convery-Pelletier | August 7, 2018
What Should You Do When Your Identity Has Been Compromised? Almost every day, someone calls me to inquire about how to deal with a compromised identity. It has become so… Daniel Smith | July 26, 2018
Is the Internet Rolling Back our Freedoms? They say when you are dead, that you don’t know you are dead. It is difficult only for others, which… Carl Herberger | January 4, 2017
When Trends Collide – Ransomware and IoT Attacks Continue A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we… Ben Desjardins | March 8, 2016
Could Your Network Survive APDoS or Hit-and-Run DDoS? Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip… Ben Zilberman | February 25, 2016
The Stadium of the Future Is Smart, But Is It Safe? How Hackers Could Target the Super Bowl – And How to Stop It Levi’s Stadium is one of the most technologically advanced stadiums ever built. It features 12,000 network ports, 1,200 access points,… Daniel Smith | January 28, 2016
Ways to Protect Against Modern Day Spear Phishing Anyone who works in the cyber-security field knows that phishing attacks – especially those against large enterprises – are on… Snir Karat | January 13, 2016
How Smoke Screen Cyber-Attacks Are Being Used in Data Breaches 2015 was a paramount year in data exfiltration. You may be familiar with many of the data breaches that were… Ron Winward | December 9, 2015
The “State” of DDoS Mitigation Products and Vendors DDoS attacks have become a mainstream topic frequently in the news with coverage in major news outlets around the globe… Dennis Usle | December 3, 2015
What Does the Volkswagen Hack mean for IoT Security? A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts… Werner Thalmeier | October 1, 2015
How the German Government’s Network Was Breached – And Why It Could Happen To You The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown… Werner Thalmeier | September 22, 2015
The 10 Immutable Laws of Personal Security on the Internet There have been a number of unbelievable data breaches lately and I have been fielding a ton of questions from… Carl Herberger | August 13, 2015