Generative Data Intelligence

Tag: information security

Equifax Offering Free Credit Locks For Life

In the wake of the Equifax breach the shakeups and changes are continuing. The CEO ‘retired’ last week and is being...

What You Should Do About The Equifax Hack

Equifax was the victim of a major data breach through their website. 143 million records leaked and if that’s one record...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Watch Out For The Hotel Credit Card Scam

It’s another day and another scam is making the rounds. This time it’s targeting hotel patrons. Like all scams this one...

New Scam Alert – Don’t Say “YES” On The Phone

Another day and another telephone scam has been seen out in the wild. This one is very sneaky and can cause...

What I Learned This Week – 1/13/17

It’s the second week of January and everything seems to be back on the routine. A new era is United States...

What I Learned This Week – 12/4/16

What I learned this week. I took the Thanksgiving week off on this series and picking it back up after a...

It’s Now 1984 In Britain, Privacy No Longer Exists There

Britain just did the unthinkable, pushing the limits of government power under the guide of protection. The government approved the most extreme,...

What I Learned This Week – 11/18/16

Another week of vast information consumption, headlines, breach reports, security bulletins and client concerns. Learning everyday in the security consulting business...

Stealing Data from Locked PCs Possible Using USB Device

Reading Time: 3 minutesThis should come as a surprise, a mild or perhaps not-so-mild shock, to those many people who lock their computer...

Blockchains vs centralized databases

Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...

The Buzz on Comodo 360

Reading Time: 2 minutesAll the buzz out of RSA was about how cyber security companies can differentiate themselves in a crowded...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?