Our Blog

Stay updated with all the latest news and announcements

pic59

A side-by-side breakdown

Cybersecurity Matchup: Apple vs Android

As the greatest software rivalry of all time, emotions can run high. So we decided to create a non-partisan fact-based analysis of Android's and iOS's cybersecurity profile.

read more



pic58

Cybersecurity Trends

Social Media and Cybersecurity

The recent proliferation of social media platforms have provided hackers with a treasure trove of personal data on pretty much anyone in the world.

read more



pic57

COVID-19 Update

Cybersecurity Survival Guide for Remote Working

Being secure means being prepared, so in this article we've broken down the major risks and key tips related to your cybersecurity posture under remote working conditions.

read more



pic56

Executive Profile

Cybersecurity, Coronavirus, and the Joys of Giving Back

Today we sit down with our Founder & CEO, Marc Castejon, to discuss his own professional journey, the current state of cybersecurity, and everything in between.

read more



pic55

The Ponemon Institute

The True Cost of a Cybersecurity Attack

Every CISO faces the unique challenge of justifying a budget whose ROI is predominantly measured by what never happened.
      

read more



pic54

Cybersecurity During a Global Crisis

"That's Out of Scope," said no attacker ever

The most vulnerable sector to cybersecurity attacks isn't Wall Street, the military, or even Silicon Valley. It's our healthcare system.
     

read more



pic53

Cybersecurity Trends

How Hackers are Spreading the (Corona)virus

The WHO has labeled COVID-19 a global pandemic, setting off a wave of sweeping measures that have impacted not only our physical lives, but our digital lives as well.

read more



pic52

The Ultimate Challenge

What is Penetration Testing?

Following a wave of devastating breaches, many firms are looking for better strategies to manage cybersecurity risks. One highly effective exercise is the PenTest.

read more



pic49

A Guide to Ransomware Payments

To Pay or Not to Pay

It's no secret that 2019 was in many ways the Year of Data Breaches. While many cybercriminals steal data in order to mount further attacks or to sell it on the Dark Web, ransomware attackers are unique in that they make a simple offer: pay a ransom and everything will go back to normal.       

read more



pic47

Cybersecurity Trends

WEF: Major Risk of Cyberattack in 2020

The World Economic Forum just released their 2020 Global Risk Report, a compilation of research conducted by global risk consultants and financial analysts defining the major business risks facing the markets in both the short and long term.          

read more



pic46

Cybersecurity Trends

Social Engineering is on the Rise

While encryption technologies, systems, and standards have become incredibly secure over the past decade, it has become increasingly clear that the the largest cybersecurity threat to nearly any organization is its people.                          ...

read more



pic44

Happy New Year's

5 Cybersecurity Resolutions for 2020

As 2019 winds down, we've decided to dig through the Silent Breach archives and review the numerous challenges, lessons, and solutions that this year has presented. What we've come up with is a list of the top five cybersecurity resolutions to make 2020 a cyber-success!              
 
...

read more



pic43

From Caesar to Honeypots

A Brief History of Cryptography

90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.         

read more



pic42

The Cybersecurity Mindset

Top Four Security Myths

Myth 1: Everyone is accountable for cybersecurity.        
We often hear things like "Everyone is accountable for security." This is false. While everyone is responsible for cyber security, only a select few are ultimately accountable.

read more



Load More