Verizon’s Data Breach Investigations Report – A Look at the Big Picture (Part 1)
2017 marks the 10th anniversary of Verizon’s Data Breach Investigations Report (DBIR), and as breaches have evolved throughout the years,…
Details2017 marks the 10th anniversary of Verizon’s Data Breach Investigations Report (DBIR), and as breaches have evolved throughout the years,…
DetailsThe second part of Verizon’s DBIR 2017 summarizes industry specific data breaches, followed by the nine incident patterns most commonly…
DetailsOn November 14th, Visa issued a new security alert regarding the increased use of point-of-sale (POS) malware to harvest card…
DetailsThe cybersecurity of the U.S. election was compromised once again as Russian-based hackers breached the voter registration databases of both…
DetailsHi everyone. Thanks for joining us for our first blog. As you might have seen this morning, Bluefin, originally based…
DetailsWearables aren’t just for showing smartphone notifications and tracking your fitness (or lack of it!) anymore. A growing number of…
DetailsGuardian Dentistry Partners, a dental partnership network with over 160 dental practices in 11 states and the District of Columbia,…
DetailsThe National Cybersecurity Awareness Month commences today, with week 5’s theme, Protecting Critical Infrastructure from Cyber Threats. The Department of…
DetailsFor banking, security and finance, 2017 was an eventful year. Bitcoin values skyrocketed, mobile wallets took off and half the…
DetailsEven though cybersecurity isn’t a “hot topic” in the current presidential debate, the data breaches of 2013-2015 set the stage…
DetailsLast week, U.S. News & World Report sat down with today’s top cybersecurity experts to discuss brute-force attacks, how this…
DetailsWhat Is Tokenization? Everything You Need to Know About Tokenization How Payment and Data Tokenization Works Payment and Data Tokenization…
Details