As online shopping has become more popular, cybersecurity professionals and enthusiasts have become increasingly concerned about malware, scam websites and other problems that could cause people to make unsafe transactions. However, maritime cybersecurity is a less commonly discussed topic, which could be a drastic oversight. After all, if cybercriminals target […]

Cybersecurity Challenges in the Maritime Industry


Impact Awards applaud individuals and organizations for their exceptional commitment to safeguarding employees, communities and the environment Blackline Safety Corp. (TSX: BLN), a global leader in connected safety technology, has announced the launch of an international safety awards program to recognize individuals and organizations that go above and beyond to […]

Blackline Safety Launches Awards Program to Recognize Exemplary Safety Efforts


Artificial intelligence has disrupted how people interact with tech. Internet security professionals warn that AI-powered cyberattacks will become more prevalent, necessitating effective countermeasures to mitigate their effects. How can individuals and organizations prepare and increase their defenses? 1. Keep Phishing Awareness Skills Sharp Tools such as ChatGPT have made it […]

3 Effective Countermeasures Against AI-Powered Cyberattacks



Imagine a relentless wave of alerts bombarding your cybersecurity team daily. Each alert could signal anything from a minor hiccup to a significant breach. Navigating this constant influx is the art and science of alert triage. This critical process ensures the most serious threats are identified and addressed swiftly, preventing […]

10 Tips for Improved Alert Triage


Securing any IT environment in today’s hyper-connected workplace is challenging. Doing so when admins don’t even know half of the devices and tools people use on a network makes it even harder. This is the problem with shadow IT — a threat that’s becoming increasingly common among businesses today. What […]

How to Reduce the Risk of Shadow IT


Addresses Rampant Proliferation of Devices at the Edge Lacking Robust Data Protection: PCs, Drones, Unmanned Vehicles, OT, IoT, and More Cigent, the leader in data protection at the edge, has introduced new secure storage drives to ensure data security for the broadest array of devices of any secure storage. Private […]

Cigent Secure Storage Drives Protect Data at Extreme Edge



Digital wallets have seen a significant rise in popularity as more people embrace the convenience of cashless transactions. These digital tools allow users to store their payment information securely on their smartphones or other devices. This enables quick and easy purchases online and in physical stores. Their growing popularity stems […]

How Secure Are Digital Wallets?


In this increasingly digital world, top executives — especially CEOs — are prime cyberattack targets. Their access to sensitive information and influence over company operations make them lucrative victims of cybercriminals. Understanding these nine unique tactics and how to defend against them is crucial for businesses and their leaders. 1. […]

9 Tactics Hackers Use to Attack CEOs


In Episode S6E5 of the BSM podcast, we sit down with Ryan Smith, the founder of QFunction, to delve into the transformative power of AI and Machine Learning in cybersecurity. Ryan shares his insights on the pressing challenges businesses face in securing their data amidst the rising tide of cyberattacks […]

AI & ML in Cybersecurity: Enhancing Threat Detection and Cost ...



When policy is not coupled with a well-planned compliance and evaluation program, the agency will likely fail to broadly adopt improved data management practices. Furthermore, if a compliance plan is absent, the agency will be at risk. Failing to ensure compliance with new requirements can call attention to gaps and […]

Good data management policy is a critical foundation for any ...


Businesses can pick from several encryption algorithms when securing their data, systems and communications. To determine which is best, they should compare each based on its type, use cases, strength and speed.  1. Elliptic Curve Cryptography (ECC) ECC is an asymmetric encryption algorithm defined by the equation “y2 = x3 […]

Which Data Encryption Methods Are Best for Your Business?


Cigent Technology, Inc. has launched the Cigent Endpoint Data Protection Platform, an expert-derived solution designed to protect data from ransomware, data exfiltration, and data loss. Developed by exfiltration experts trained in the most demanding environments, the platform provides a comprehensive suite of endpoint data protection services, setting a new standard […]

Enhanced Security and Productivity with Cigent Endpoint Data Protection