Category Archives: Consulting

The many-colored hats of the hacking world

An overview of the different types of hackers.

Continue Reading →

5 myths about cybersecurity every business should know

Many myths about cybersecurity pervade in the business world. Here are five of those myths that all businesses should be aware of if they want to protect their information from cybercriminals.

Continue Reading →

Incident response: Critical security for the digital age

As the number of data breaches rises each year, organizations must re-evaluate their incident response strategies.

Continue Reading →

IoT devices and routers at risk due to BotenaGo malware

A new malware variant, BotenaGo, could potentially impact millions of IoT devices and routers after its authors published the source code online.

Continue Reading →

2021 was a record-setting year for data breaches; what’s next?

The ITRC recently released its annual data breach report, covering dramatic trends in cybersecurity. Here’s what you need to know for 2022.

Continue Reading →

The risks of open-source software

Most companies and software products utilize open-source code, but these components come with a plethora of security risks.

Continue Reading →

Data breaches: what are the causes and consequences?

To help your organization improve its cybersecurity, we go over the main causes and risks of data breaches.

Continue Reading →

New type of SIM card cyberattack exploits Java-based apps

A new type of cyberattack capable of exploiting vulnerabilities in Java applications run through SIM cards installed on smartphones has been identified by a mobile security company, according to ZDNet.

Continue Reading →

Private vs. public vs. hybrid cloud infrastructure

Making the right decision on the cloud means you’ll need information. 

Continue Reading →

How blockchain is transforming the financial services space

Among the many organizations testing the blockchain waters, those in the financial services space are best positioned to see return on investment on phase-one implementations.

Continue Reading →