Search Results for: privacy Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or... Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in... Blog Post Cybercriminals Take Aim at Connected Car Infrastructure December 15, 2021 We are barreling headlong into the self-driving car trend, but what are the cybersecurity risks? It’s been coming for some... Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention.... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the... Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the... Blog Post Security Maturity Models Part 1: What is Security & Privacy Capability Maturity Model? November 16, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to... Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital... Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern.... Blog Post Zoom Now Stops New Features to Improve Security and Privacy April 3, 2020 Due to the coronavirus pandemic, Zoom’s free and paid users have grown from 10 million in December 2019 to 200... Blog Post Next wave of Privacy, Security and Compliance March 30, 2020 After the effective implementation of GDPR (General Data Protection Rule) and ePrivacy Regulations into the industry for better security, organizations...
Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post New Spyware Law in Germany Poses Threat for Press Freedom December 8, 2021 This June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in...
Blog Post Cybercriminals Take Aim at Connected Car Infrastructure December 15, 2021 We are barreling headlong into the self-driving car trend, but what are the cybersecurity risks? It’s been coming for some...
Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention....
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the...
Blog Post FBI got to the pockets of criminal gangs by selling them messaging app July 14, 2021 ANOM secure messaging app: Approximately 9,000 officers deployed in 48 hours to over 700 locations in 16 countries across the...
Blog Post Security Maturity Models Part 1: What is Security & Privacy Capability Maturity Model? November 16, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
Blog Post Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
Blog Post LIFARS Uncovers a Clubhouse Vulnerability, Responsible Disclosure Follows February 22, 2021 New York, February 22, 2021 – LIFARS LLC, a New York City-based leader in cybersecurity services, including incident response, digital...
Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern....
Blog Post Zoom Now Stops New Features to Improve Security and Privacy April 3, 2020 Due to the coronavirus pandemic, Zoom’s free and paid users have grown from 10 million in December 2019 to 200...
Blog Post Next wave of Privacy, Security and Compliance March 30, 2020 After the effective implementation of GDPR (General Data Protection Rule) and ePrivacy Regulations into the industry for better security, organizations...