Featured Blogs
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...
3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy
Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives...