Our Blog

Stay updated with all the latest news and announcements

pic67

Cybersecurity News

Are the Russians Hacking the Tokyo Olympics?

Following repeated penalties for state-sponsored doping, Russia was finally banned from all Olympic sports for 4 years. Have they retaliated by hacking the games themselves?

read more



pic66

2020 Space and Cybersecurity Symposium

Why the US Space Force is Hiring Hundreds of Hackers

As NASA struggles to fend off a fresh wave of cyber-attacks, the US Space Force is quickly ramping up its cybersecurity capabilities to counter foreign interference.

...

read more



pic65

Cybersecurity News

How Hackers Are Targeting NASA

During a recent Senate hearing, top NASA officials admitted that it is "incredibly difficult to keep NASA's defenses up." Here's why.      

...

read more



pic64

3 Lessons Learned

Inside the Million Dollar Plot to Hack Tesla

According to FBI reports, Russian actors spent the summer of 2020 planning a cyber-attack against Tesla's systems.

read more



pic63

Top Four Cybersecurity Threats

Can the US election get hacked?

Several national security agencies have already confirmed foreign efforts to influence the US elections. Here are the top cybersecurity risks and their likelihood of success. ...

read more



pic62

Guest Post

Summary of US Data Privacy Laws

With rapid evolution of the digital world, data privacy protection has become a global trend for organizations, individuals and governments.

read more



pic61

Cybersecurity Trends

Is TikTok a National Security Threat?

Over the past few years, government entities around the world have banned public employees from installing TikTok on government phones. In the US, TSA personnel and soldiers a...

read more



pic60

Lessons from COVID-19

How to prepare for the inevitable global cyberattack

While globalization has created economic and political opportunities for many, it is also contributed to the rapid spread of contagions such as COVID-19.

read more



pic59

A side-by-side breakdown

Cybersecurity Matchup: Apple vs Android

As the greatest software rivalry of all time, emotions can run high. So we decided to create a non-partisan fact-based analysis of Android's and iOS's cybersecurity profile.

read more



pic58

Cybersecurity Trends

Social Media and Cybersecurity

The recent proliferation of social media platforms have provided hackers with a treasure trove of personal data on pretty much anyone in the world.

read more



pic57

COVID-19 Update

Cybersecurity Survival Guide for Remote Working

Being secure means being prepared, so in this article we've broken down the major risks and key tips related to your cybersecurity posture under remote working conditions.

read more



pic56

Executive Profile

Cybersecurity, Coronavirus, and the Joys of Giving Back

Today we sit down with our Founder & CEO, Marc Castejon, to discuss his own professional journey, the current state of cybersecurity, and everything in between.

read more



pic55

The Ponemon Institute

The True Cost of a Cybersecurity Attack

Every CISO faces the unique challenge of justifying a budget whose ROI is predominantly measured by what never happened.
      

read more



pic54

Cybersecurity During a Global Crisis

"That's Out of Scope," said no attacker ever

The most vulnerable sector to cybersecurity attacks isn't Wall Street, the military, or even Silicon Valley. It's our healthcare system.
     

read more



pic53

Cybersecurity Trends

How Hackers are Spreading the (Corona)virus

The WHO has labeled COVID-19 a global pandemic, setting off a wave of sweeping measures that have impacted not only our physical lives, but our digital lives as well.

read more



pic52

The Ultimate Challenge

What is Penetration Testing?

Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.

read more



pic49

A Guide to Ransomware Payments

To Pay or Not to Pay

It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.       

read more



Load More