unauthorized access

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

Equifax: 5th Largest Data Breach Ever and Their Troubles Don't End There

As of writing this article on Thursday, September 7th, 2017, yet another corporate mega-breach has been revealed and this time it's the credit-reporting agency, Equifax. Negligence, terrible communications, bad crisis management … someone's head is gonna roll.

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

Seriously?! Can You Not Do That? | Chapter II

Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.

Serena L-G., 12 and a Half Years Old, Says "Sec_rity is not complete without you"

As part of a community service project for school, when asked to write an article to describe a teen's view of cybersecurity, Serena L-G. produced this fantastic article that every parent should read.