Our Blog

Stay updated with all the latest news and announcements

pic47

Cybersecurity Trends

WEF: Major Risk of Cyberattack in 2020

The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts defining the major business risks facing the markets in both the short and long term.          

read more



pic46

Cybersecurity Trends

Social Engineering is on the Rise

While encryption technologies, systems, and standards have become incredibly secure over the past decade, it has become increasingly clear that the the largest cybersecurity threat to nearly any organization is its people.                          ...

read more



pic44

Happy New Year's

5 Cybersecurity Resolutions for 2020

As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented. What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!              
 
...

read more



pic43

From Caesar to Honeypots

A Brief History of Cryptography

90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.         

read more



pic42

The Cybersecurity Mindset

Top Four Security Myths

Myth 1: Everyone is accountable for cybersecurity.        
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible for cyber security, only a select few are ultimately accountable.

read more



pic40

Are our governments prepared?

The Politics of Cybersecurity

The State of Mississippi completed its first governmentwide cybersecurity audit this month. The results were less than encouraging.
                                        

read more



pic39

Can they work together?

Cybersecurity and Healthcare

In the wave of large-scale cybersecurity breaches sweeping the country, there is one sector which is barely reported on, and yet represents possibly the most pressing technological threat to human life.
                    
...

read more



pic38

The California Consumer Protection Act

A Brief Guide to CCPA

The California Consumer Protection Act (CCPA) is designed to enhance data privacy rights and consumer protections for the citizens of California and comes into effect on January 1, 2020. Although it's been over 2 years since the bill has been ratified, many companies are still not sure if and how they will be affected.  

read more



pic37

3 Takeaways from the Ecuador Breach

Julian Assange Gets a Taste of His Own Medicine

Earlier this week, residents of Ecuador woke up to the news that much of their personal data, including banking details, employment information, and identification numbers, had been made publicly available by a small online consulting firm.
       

read more



pic36

What Facebook keeps getting wrong

The Culture of Cybersecurity

Yet another 419 million Facebook accounts have been breached. Add this to the 100s of millions already compromised in the Cambridge Analytica, UpGuard, and 'View As' scandals, and the question becomes: can Facebook ever be secure?            

read more



pic35

Continuous Monitoring

The Latest in Cybersecurity Trends

Here's a fact: On average, it takes companies nearly half a year to identify a cyber security breach. 
Here's another fact: Research shows that breaches that take over 30 days to contain cost an average of $1 million more than those contained within the first month.
...

read more



pic34

Lessons from Black Hat 2019 and Def Con 27

The Myth of Cyber Security

Riddle: What do Marriott, Equifax, and Capital One all have in common?
Answer: They've each been the victim of a data breach compromising 100 million+ users each; all in the past 12 months.                 

read more



pic33

What is DevSecOps and how can you benefit from it

DevOps is outdated. Here comes DevSecOps.

Over the last several years, DevOps has dramatically transformed the way in which software is designed, developed, and delivered.
                             
...

read more



pic32

5 Important Steps to Help Your Business Respond Quickly and Safely

You've Been Hacked. Now What?

Unfortunately, successful cyberattacks are growing far too common. A 2018 study found that nearly 70% of SMBs have experienced a cyberattack in the past year, yet an astounding 47% of respondents said they "have no understanding" of how to protect themselves ...

read more



Load More