The U.K. withdrew from the European Union on January 31, 2020. The transition period of the withdrawal lasted until December 31, 2020, and thus all laws applicable to the EU Member States were in effect during this period. But,...
Kroger, the U.S.-based supermarket chain, is the latest victim of a data breach through Accellion’s legacy file transfer software. In an official notice, the retail giant admitted that it was impacted by a security breach after an unauthorized third-party...
To drive an effective security program, businesses need to have visibility into the organization’s threat landscape. But to do this, they need to consume Threat Intelligence. Many security and risk professionals are disappointed in the results of their cyberthreat...
Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, widespread botnet activity, and some of the largest DDoS attacks ever recorded. As COVID-19 drove an urgent shift online for everything...
Chat service provider WhatsApp and its competitors like Telegram have always maintained that their products provide end-to-end encryption (E2EE). But the recent turn of events around the globe has raised concerns about these claims. There is a widespread possibility...
When you hear the phrase “penetration test,” what do you think of? I’ve asked this question to dozens of security professionals and I received a different answer from each person I asked. Penetration tests are well-known requirements in the...
Apple is known for its airtight security across its product line. However, a mystery malware dubbed “Silver Sparrow” has broken this myth by infecting nearly 30,000 Macs (29,139 to be precise) in over 153 countries worldwide. Researchers are scratching...
Businesses sink a lot of time and effort into finding the right candidate for a position. One SHRM survey, for instance, found that the average cost-per-hire is more than $4,100 (a conservative number). However, all that time and money become immaterial...
A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the use of smartphones and electronic payment cards for financial transactions and as carriers of...
There is a popular saying that goes, “A Prophet is without honor in his own country.” I can attest to the veracity of this statement as a Security Evangelist. Rodney Dangerfield stated it in another way: “I don’t get...














