Author: Amir Jabbar

  • Why Information Security Need to be Empowered to Manage Data Breaches

    Why Information Security Need to be Empowered to Manage Data Breaches

    Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has…

  • Data Mining Issues that Still Persist in 2018

    Data Mining Issues that Still Persist in 2018

      Data mining has become more important than ever. Brands and consumers use a wide range of platforms to exchange data. There are a lot of applications for these platforms as well. Many people use digital platforms to look for products and services. Unfortunately, organizations that use data mining to streamline their customer service strategies…

  • The truth about Artificial Intelligence and DDoS attacks

    The truth about Artificial Intelligence and DDoS attacks

    The recent developments in DDoS attacks have been unnervingly rapid, not to mention scarily effective. It seems every time mitigation efforts adjust to a new attack type or innovation, something else comes along that upends what security professionals think they know and have prepared for. Once in a great while, however, the rumblings and rumors…

  • What Are the Best steps in a Cyber Security Incident?

    What Are the Best steps in a Cyber Security Incident?

    With many malware and ransomware attacks happening on numerous systems, many companies and households are wondering just how safe their network connections are. With network security that seems like it is working, it may not be protecting your systems against all of the threats that happen to the computer. With many viruses rapidly spreading and…