Cybersecurity


Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...


Guest Contributor: Sterling Kellis, Assistant Dean of Technology, College of Information Systems and Technology, University of Phoenix American jazz musician Charles Mingus once said, “Making the simple complicated is commonplace, but making the complicated simple, awesomely simple, that’s creative genius.” Today, the security industry is in need of a stroke […]

Cybersecurity Upskilling and Lifelong Learning in the Digital Age



The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...




Guest Contributor: Kim Crawley I’ve been playing quite a bit of Assassin’s Creed Syndicate. Yes, I know the game came out in 2015. But in the past several years, I’ve played Assassin’s Creed II, Assassin’s Creed Brotherhood, Assassin’s Creed Revelations, Assassin’s Creed III, Assassin’s Creed Liberation, and Assassin’s Creed Rogue. […]

These Web Browsers Will Help You Surf the Web Stealthily


Guest Contributor: Aravind P R E, Product Consultant, ManageEngine A common question posed by enterprises when it comes to defending against cyberthreats is “Which operating system is most secure?” There are only a few major operating systems (OSs) available, so enterprises aren’t left with many choices. Out of the big […]

Linux Security and Patching: Are You As Safe As You ...