Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

FAKE APPS: Mirror mirror on the wall, which of these apps is real amongst...

What is the difference between a real and fake app? Well, one is legitimate and one is malicious. You would think that this topic would be general...

WAR-DRIVING: Coffee goers beware!

Wardriving is the art of executing a mobile attack surface, by literally being on the move while propagating a wireless attack. You achieve this by creating an...

SMISHING & GREYWARE: Come again?

Let’s talk about some areas of mobile security that fly under the proverbial radar; Smishng & Greyware. These are terms that the 99.99% of users never hear...

FREE APPS: Not as free as you might think!

When searching the app store (on a budget), we come across millions of “free” apps and we are inclined to download them. What is the difference between...

SSL 101: Who Dis?!

Secure Socket Layer certificates were first used in the early 90’s and have since grossed over 2 trillion dollars via enabling e-commerce sales. In the market,...

DUDE, WHERE’S MY ENDPOINT: The plight of endpoint security

Cyber spending is often done at many levels, most commonly the firewall and advanced analytic solutions. The essential gap that is missed is protecting endpoints within the...

Cyber-Weapons: The Krav Maga of cyber security

Unexpected tactically-driven attacks are so effective in the industry today because of the violent nature and overall surprise. Krav Maga is a guerilla hand-to-hand combat fighting style...

MINE OR YOURS: Who owns the information on your mobile device?

Mobile security is becoming a huge concern for the business and enterprise world as the BYOD discussion is an expensive one – either companies enforce a corporate...

Fort Knox or Cardboard Box: Importance of Physical Security

Are you spending millions of dollars annually but still lack the ability to prevent cyber espionage? The answer is more simple than you think – Physical Security. Over-spending...

HACKERS WANT YOU: to fall for phishing emails

One of the easiest methods of infiltrating the most security-driven companies, is the classic phishing email. Phishing emails are designed to take advantage of easily exploitable employees...

Must Read