Tag: Security

SeCaaS Secure Cloud

SeCaaS – A Step Towards a Secure Cloud

Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

/ October 29, 2017
Blockchain Security

Blockchain Transaction Authentication and Security

In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

/ October 4, 2017
Blockchain

Securing Supply Chain with Blockchain

Supply chain management was a big idea to improve visibility and control on goods as they moved from point A to point B a few centuries ago. However, with current technologies and concepts, it has become difficult to manage such a big...

/ October 4, 2017
Chat icon front of blackboard

E-ZPass Spear Phishing Email Alert

Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

/ July 28, 2014
Cyber Security Summit Wrap Up and Tips to Detect, Defend, Recover

Cyber Security Summit Wrap Up and Tips to Detect, Defend, Recover

Have you ever been to an event that left you wanting more when the subject matter just wasn’t up to par or even worse, an event that was almost entirely sales focused and you found yourself spending more time fixing yourself another...

/ September 30, 2013
Is Employee Cybershopping Threatening Your Companys Security

Is Employee Cybershopping Threatening Your Company’s Security?

As we wrap up one of the biggest cybershopping weeks of the year many CEO’s and CIO’s are probably wondering how much time their employees spent shopping online this week and may be overlooking the security implications of this activity. Industry statistics...

/ December 2, 2011
Portrait of beautiful young woman using laptop while holding credit card at home

Has it really come down to a bag of chips?

A recent vending machine company had some of its POS systems compromised at waterparks in Wisconsin and Tennessee. This was a major breach…up to 40,000! Go figure. People can’t even buy some snacks or what not from a vending machine without having...

/ September 20, 2011
Security Faux Pas

Security Faux Pas

Organizations and the press do a pretty good job of keeping the average person aware of the latest big technology vulnerability or exploit.  And yet, we still see some common mistakes people make that could make them a susceptible to being exploited....

/ August 12, 2011
Too Extreme I dont think so. Tying security to compensation

Too Extreme? I don’t think so. Tying security to compensation.

A colleague of mine recently posted a blog about the Black Hats getting the job done and rightfully so. Hackers have been pillaging the countryside lately. How many company compromises have there been over the last 3 months? More than there should...

/ August 8, 2011
Closeup of photographer man holding and looking through circular polarizer filter

Keep living in a fantasy world…

It will never happen to us. We know what we are doing. We are too small to be a target. Besides, we have a firewall, intrusion detection system and some really talented people in place to protect us from these so-called hackers....

/ July 11, 2011
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...