Jan 7, 2020 | Cloud security, Cyber Risk, Recent News, Security, Threat Modeling
Data has become one of the most treasured resources in the world. Businesses that rely on cybernetic technology driven by data are perhaps the most influential companies in the world, triggering continuing discussions about anti-trust regulation, digital privacy and...
Dec 31, 2019 | Recent News, Security
Over the past decade, our world has experienced horrific data breaches, a massive number of hackers, lots of nation-wide cyber-undercover activities, and devastating malware that has made systems inoperative. Data breaches take place daily, but during the 2010s, we...
Dec 24, 2019 | Cyber Risk, Risk Management, Security
5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...
Dec 16, 2019 | CISO, Cloud security, Cloud Threat Modeling, Security, Threat Models
The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach. This article reviews the potential damages that can occur with a social profile...
Dec 11, 2019 | DevSecOps, Risk Management, Security
A majority of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the point where the public barely raises an eyebrow over new incidences. While credit card issuers have gained efficiency at...