Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security...
Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
Reading Time: 3 minutesWhile SSL/TLS certificates provide the backbone for information security—digital certificate management is going to get harder as enterprises turn to...
Another week of vast information consumption, headlines, breach reports, security bulletins and client concerns. Learning everyday in the security consulting business...
Reading Time: 2 minutesUsing hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company...
Reading Time: 2 minutesDDoS attacks (Distributed Denial of Service attacks) and the data breaches that accompany such attacks are of serious consequence; these...