Guest Contributor

By: Sean Goertz To say there’s a lot of hype around the commercial potential of drones is a bit of an understatement. Between the headlines talking about the billions of dollars that the technology represents along with talk about how UAVs can make a measurable difference when it comes to making a given […]

Professional Drone Operators Should be Using Professional Equipment

By, Guest Contributor: Akshatha Kamath There was a time when a career in IT was limited to mainframe computers and network support. IT professionals were charged with ensuring technology worked correctly within their organizations so employees could get their jobs done without glitches. Those days seem like ancient history now, […]

5 Compelling Reasons to Get a Cyber Security Certification

By: Graham Joseph Penrose Guest Contributor   Facebook was ordered on the 16th February 2018, in an 84 page judgment by a Belgian court, to stop collecting certain data on users or face daily fines of €250,000, with an upper cumulative limit of €100 million. In summary Facebook must stop placing cookies on users’ computers unless: It has informed […]

Belgium Privacy Watchdog Takes 100 Million Exceptions to Facebook’s Illegal ...

By Kim Crawley Cybersecurity Journalist City Union Bank is a large financial institution based in India, the world’s second most populous country. [Recently], cyber attackers attempted to fraudulently transfer nearly $2 million USD in three SWIFT transactions. I’m vaguely familiar with the international SWIFT money transfer system because I’m a […]

Cyber attackers tried to steal $2 million from City Union ...

By: Chris Gebhardt, Director of Information Security Many privacy advocates become apoplectic at hearing the US government’s demand for a backdoor into encrypted devices and communication. I too felt the government didn’t need to see my communications. However, there is a legal justification for such a backdoor. I didn’t like […]

The US Government Should Have Access to All Encrypted Devices ...

Guest Contributor Bill Hess – PixelPrivacy HummingBad malware infected over 10 million Android devices in the summer of 2016. The malware was capable of taking over an Android smartphone or tablet, stealing and selling a device’s user information, and downloading and installing unauthorized apps. Also in 2016, Mazar malware is downloaded when users click on […]

How to Remove Malware & Viruses From Android Phones (Oreo ...

Examining the Threat Posed by Cyberattacks Against Critical Infrastructure By Joe Grillo, CEO, Vanderbilt We probably take critical infrastructure for granted in our day-to-day living. We turn on a tap, flick a switch, or push a button and water, light, and heat are all readily available to us. However, as […]

Examining the Threat Posed by Cyberattacks Against Critical Infrastructure

From May 2018, EU member states will adopt new data privacy legislation known as the General Data Protection Regulation (GDPR), which will standardize and improve the regulation of data protection across participating member states.  The following brilliant infographic from Orla Forrest of Exigent Networks provides a simplified guide to how data protection […]

How will the 2018 GDPR changes work

by: Sripati MS Information Security Consultant at a leading security service provider in Oman   I came across this rant (with the usual don’t-kill-me-am-just-making-a-random-statement-and-fully-intend-to-get-away-with-it disclaimer) on LinkedIn about how CISO’s are clueless about how a virus works, even with CISA/CISM and a decade’s experience under their belt. It got me seething about how this statement is […]

Please don’t kill your CISO if he doesn’t know how ...