Is Hotel Cyber Security Sleeping on the Job?

When we think of burglars breaking into a house, our minds conjure up images of knitted hat-covered criminals grabbing .

Reflections on the CrowdStrike - Zscaler Partnership

I was always troubled by the lack of complete visibility in the network.

Bank leaves sensitive data exposed on GitHub repositories

A North American bank stored highly sensitive digital property in a series of publicly open and accessible GitHub .

Crypto mining- deep, dark and profitable

Crypto-mining (or crypto-jacking) malware campaigns climbed 29 percent from Q4 2018 to Q1 2019 according to a new study .

Encryption, a friend or foe of cybersecurity?

Encryption has been hailed as the savior of security and privacy online. Enterprises across the globe are increasingly .

AI-based endpoint protection (EDR or AV) can be fooled a.k.a. our AI is bigger than yours

Last week, security researchers announced to the world that they have managed to outsmart one of the most popular EDR .
0 1 2 3