Editorial

The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings
Editorial The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings

The smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would be the Amazon Echo smart speaker. A recently published study de

Thinking Like a Hacker (Ethically)—the Why and How
Editorial Thinking Like a Hacker (Ethically)—the Why and How

Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright. A

Protecting Your Expanding Attack Surface
Editorial Protecting Your Expanding Attack Surface

As much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were and still are also at

What you need to know about data privacy & 5 steps to ensure your organization stays compliant
Editorial What you need to know about data privacy & 5 steps to ensure your organization stays compliant

Data Privacy is an area of data protection that deals with the proper handling of information, focusing on compliance with data protection regulations. How data should be collected, stored, managed, and shared with any third parties—are the main concerns of data privacy. These concerns encompass t

How to Win at Website Security – Explore the Most Secure CMS Platforms
Editorial How to Win at Website Security – Explore the Most Secure CMS Platforms

When it comes to website security, you can’t compromise. The COVID-19 pandemic has brought with it a  600% raise in cybercrime compared to the previous year. These cyber attacks consisted of sophisticated phishing emails that took advantage of worldwide network security vulnerabilities.    In this n

Cybersecurity Compliance: Understanding Which Regulations Apply to Your Business
Editorial Cybersecurity Compliance: Understanding Which Regulations Apply to Your Business

Assessing which rules and regulations apply to an organization is never an easy endeavor. More often than not, companies need to comply with multiple regulations, many of which have overlapping stipulations. Understanding compliance regulations and the acceptable requirements for developing a

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later