You’ve been driving all day and could use a meal. You exit the highway and end up in a small town with just one main road. Along the road there’s a Wendy’s, and what appears to be a small restaurant. These seem to be your only two options. Which will you choose? On one hand, […]

Read more

It was inevitable that artificial intelligence technology would eventually be implemented into cyber defense (and hacking, for that matter). What was less obvious was how exactly that implementation would occur. Now that the shift has begun, we’re developing a greater understanding. AI is particularly adept at handling the large volumes of data that flow through […]

Read more

It was 9:58 p.m. on March 18th, 2018, on a road in Tempe, Arizona. The sky was particularly dark, and the road poorly lit. Elaine Herzberg, 49 years-old, was crossing with a bicycle, carrying shopping bags. The dashcam footage tells the rest of the story. Driverless technology is fast approaching. We as a society will […]

Read more

Nearly half of North American and European employees use their own devices for work. In developing nations (e.g. India), the rate is much higher. As external devices become integrated into the workplace, however, they bring cybersecurity vulnerabilities along with them, because every new computer in a network constitutes a new path for potential malicious attacks. […]

Read more

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42% […]

Read more

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if […]

Read more

Last week, hundreds of millions of people uploaded pictures of themselves to FaceApp.  You, your friends, your parents, comedians, athletes, the Avengers. It was all fun, until Senator Chuck Schumer tweeted last week that FaceApp might constitute a national security threat.  His argument had very little to do with the app itself, and almost everything […]

Read more

On Black Friday, 2013, millions of shoppers went to Target stores around the U.S. They picked out what they wanted, stepped up to a cashier, swiped their credit cards and left happy. Except they shouldn’t have been happy. Months earlier, hackers broke into Target IT systems through a small, third-party HVAC contractor to the company. […]

Read more

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case […]

Read more

Better late than never. Better luck next time? These phrases conjure up notions of doing too little too late. They don’t exactly instill very much confidence. Perhaps something that should’ve been done, just wasn’t. So what happens next? Should you blame a person, or perhaps a team? Did someone do something wrong on purpose, or […]

Read more