breach

BYOD: Useful or Unpredictable?

Nearly half of North American and European employees use their own devices for work. In developing nations (e.g. India), the rate is much higher. As external devices become integrated into the workplace, however, they bring cybersecurity vulnerabilities along with them, because every new computer in a network constitutes a new path for potential malicious attacks. […]

BYOD: Useful or Unpredictable? Read More »

Nearly half of North American and European employees use their own devices for work. In developing nations (e.g. India), the rate is much higher. As external devices become integrated into the workplace, however, they bring cybersecurity vulnerabilities along with them, because every new computer in a network constitutes a new path for potential malicious attacks.

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42%

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor Read More »

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42%

Who Can Hear You In Your Bedroom?

There is no place in the world where you feel so safe, so alone, as your bedroom. It’s why we feel comfortable there, while doing the most vulnerable things humans do. A listening device within the four walls of one’s bedroom was, for most of recent history, a tool for evil, only found in science

Who Can Hear You In Your Bedroom? Read More »

There is no place in the world where you feel so safe, so alone, as your bedroom. It’s why we feel comfortable there, while doing the most vulnerable things humans do. A listening device within the four walls of one’s bedroom was, for most of recent history, a tool for evil, only found in science

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Data breach at the border. Are your subcontractors an easy target? Read More »

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Is FaceApp Misusing Your Data?

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything

Is FaceApp Misusing Your Data? Read More »

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything

Myth: Having a Password Vault will keep your data safe

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company.

Myth: Having a Password Vault will keep your data safe Read More »

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company.