Category: Security

  • Docker Image Security Requires a Layered Approach

    Docker Image Security Requires a Layered Approach

    Scanning for vulnerabilities in software components has become one of the most important aspects in software development. Whenever we consume a component, it’s crucial to the release process for us to ensure that it does not introduce any kind of a security breach or vulnerability. Whether we are using Maven, NPM or any other technology,…

  • Top 10 cloud security training resources

    Top 10 cloud security training resources

    Cloud computing skills are in high demand right now. However, on the down-side, statistics have shown that there is a shortage of cybersecurity professionals. Today, 40 percent of businesses are looking for ways to find employees who are qualified in this kind of computing.  By 2019, there will be 1.5 million job openings and the…

  • Fingerprint sensors are not the guarantee to privacy

    Fingerprint sensors are not the guarantee to privacy

      Biometric authentication is the latest, shiniest toy for large tech companies, especially among manufacturers of smartphones. Technology like fingerprint sensors, iris scans, facial image recognition and voice recognition used to be the stuff of sci-fi movies. But now, thanks to companies like Apple, biometric recognition systems (especially finger scanning), are directing modern smartphones into…

  • Why enterprises should be investing in Cybersecurity

    Why enterprises should be investing in Cybersecurity

    Cybercrime is a significant threat to businesses of all sizes. And not just larger corporations. It especially affects businesses that depend on computerized technology to conduct their daily business. So, investing in cybersecurity to protect your business and data from malicious cyber-criminals and hackers isn’t just desirable. It’s absolutely essential to maximize resistance against threats.…

  • Why Information Security Need to be Empowered to Manage Data Breaches

    Why Information Security Need to be Empowered to Manage Data Breaches

    Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has…

  • 8 breakthrough events in the history of cybersecurity [Infographic]

    A cyber attack is a strike against a computer system, network, or internet-enabled application or device. These attacks happen daily and are constantly evolving. In the past 50 years, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising presidential elections. While threats continue to develop, it’s important to remember…

  • The truth about Artificial Intelligence and DDoS attacks

    The truth about Artificial Intelligence and DDoS attacks

    The recent developments in DDoS attacks have been unnervingly rapid, not to mention scarily effective. It seems every time mitigation efforts adjust to a new attack type or innovation, something else comes along that upends what security professionals think they know and have prepared for. Once in a great while, however, the rumblings and rumors…

  • Data safety and backup tips for small businesses

    Data safety and backup tips for small businesses

      Small business enterprises are the backbone of the economy of any state of the world. Employers invest reasonable well and then try to generate more and more revenue from their small piece of business. On the other hand, the involvement of the tech-gadgets and devices such as cell phones and PCs is imminent and…

  • What Are the Best steps in a Cyber Security Incident?

    What Are the Best steps in a Cyber Security Incident?

    With many malware and ransomware attacks happening on numerous systems, many companies and households are wondering just how safe their network connections are. With network security that seems like it is working, it may not be protecting your systems against all of the threats that happen to the computer. With many viruses rapidly spreading and…

  • Personal data – 55 things you need to know about GDPR

    No doubt you’ve heard of the General Data Protection Regulation (GDPR) act introduced by the European Union by now. Some companies – such as Facebook and Google – have already been accused of breathing the legislation; which protects EU citizens from having their personal data misused. It also gives them more control over their personal…