Ransomware -- a sneaky, dangerous cyber threat

Ransomware -- a sneaky, dangerous cyber threat

Over the past few years, ransomware has been increasing at an alarming rate, and according to various sources it is estimated that cybercriminals made around $1 billion in 2016. Hackers are becoming more sophisticated in getting...

02/15/17

Tips on how to communicate with the board

Tips on how to communicate with the board

Clean and effective communication with the rest of the board members is vital to getting your cybersecurity agenda across.

04/11/16

The rise of LinkedIn fraud

The rise of LinkedIn fraud

LinkedIn is among the most popular and profitable social media networks in the world. The platform hosts nearly half a billion users globally, many of whom who pay for subscriptions and features, proving the value of a globally...

02/22/16

Fending off cyber extortion can be difficult

Fending off cyber extortion can be difficult

There is a common theme running through many of the recent massive data breaches: cyber extortion. This new trend is gaining popularity on both corporate and individual level. To effectively combat this threat, a good understanding of...

12/02/15

2015: The most prolific year for OS X malware ever

2015: The most prolific year for OS X malware ever

2015 is a year that will be remembered and pinned for later reference by Apple's software and security engineers. This, is the most prolific year for OS X Malware in history.

10/30/15

Getting your Information Security team right

Getting your Information Security team right

Companies are investing in cybersecurity more than ever and it is a critical and yet a difficult task to bring a team that effectively monitors threats and manages security incidents. Despite the increased trend in spending in...

10/14/15

Be careful in putting your cybertrust in Google, Microsoft and Apple

Be careful in putting your cybertrust in Google, Microsoft and Apple

Security professionals and consumers often feel that they understand cybersecurity just by using words and technical descriptions of product labels, vendors’ marketing campaigns, and manuals. Especially when knowing that we bet on the...

09/24/15

Load More