Latest Posts


Hackers Target Online Gambling Sites

February 19, 2020 Added by:Ionut Arghire

Gambling and betting operations in Southeast Asia have been targeted in a campaign active since May 2019, Trend Micro reports.

Comments  (0)


When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)


SEC Shares Cybersecurity and Resiliency Observations

January 30, 2020 Added by:Ionut Arghire

The U.S. Securities and Exchange Commission (SEC) has published a report detailing cybersecurity and operational resiliency practices that market participants have adopted.

Comments  (0)


What Does Being Data-Centric Actually Look Like?

January 17, 2020 Added by:Sam Bocetta

Data-centric approaches are a powerful way of increasing the adaptability and profitability of your business.

Comments  (0)


The Big 3: Top Domain-Based Attack Tactics Threatening Organizations

January 17, 2020 Added by:Zack Allen

Attackers often buy ‘look-alike’ domains in order to impersonate a specific brand online.

Comments  (0)


Security Compass Receives Funding for Product Development and Expansion

January 17, 2020 Added by:Kevin Townsend

Toronto, Canada-based Security Compass has received additional funding from growth equity investment firm FTV Capital.

Comments  (0)


Password Shaming Isn’t Productive – Passwords Are Scary Business

January 15, 2020 Added by:Tim Mackey

With the complexity of consumer devices only increasing, contextual security should be a priority for all – a situation which would avoid password shaming.

Comments  (0)


Five Key Cyber-Attack Trends for This Year

January 14, 2020 Added by:Marc Wilczek

5 key cyber-attack trends that are expected to develop during the coming months.

Comments  (0)


20/20 Vision on 2020's Network Security Challenges

January 13, 2020 Added by:Avishai Wool

Organizations will likely need to embrace more automation across all security and compliance-related processes.

Comments  (0)


Is Cybersecurity Getting Too Complex?

January 13, 2020 Added by:Sam Rubin

To find the right services that complement specific resource gaps, enterprises should first fully assess their own security current state.

Comments  (0)