It seems that no matter how advanced cyber security systems get over time, the human factor always remains the greatest liability. When it comes to cyber attacks, most of the time the breach happened due to an employee's misjudgment, carelessness, or simply lack of knowledge. According to a research conducted by BakerHostetler that observed the causes of major security breaches … [Read more...] about Preventing Errors: The Human Factor in Cyber Security
attack
Understanding SDR-Based Attacks on IoT
IoT devices are ubiquitous today. Many of these devices use RF based communication techniques to connect to other devices or to receive commands from remote controls in near field. Many devices like smart tube lights have dual mode operation, in which they connect over the internet for interfacing with a mobile app or via RF with a local remote. RF based communication interface … [Read more...] about Understanding SDR-Based Attacks on IoT
Robotics is Growing, So Are the Security Concerns
Any security professional would recommend that you lock down your home or facility with a video monitoring system. Likewise, they would likely point out that protecting your online network with a firewall is common sense. But what about the other computerized, connected devices that are often overlooked? With technology playing a part in almost everything we do these days, … [Read more...] about Robotics is Growing, So Are the Security Concerns
Top 5 Vulnerabilities In APIs
A vulnerability in the context of software applications is a violation of the defined security policies. Modern web apps are centered on the idea of keeping the workflow logic in the client side and its interaction with the server using APIs (application programming interface). Developers try to make the APIs as stateless as possible, in accordance with the REST principles. … [Read more...] about Top 5 Vulnerabilities In APIs
How to Secure Your Cloud-based Applications From Cyber Security Attacks
We think our customers' data and business information is safe if we store everything in the cloud. This is true to some extent and this kind of shift has also made businesses from small to big save a lot of money by reducing their IT expenses, access scalable tools, and reduction of on-site load of their IT infrastructure. According to CSA (Cloud Security Alliance), nearly 70% … [Read more...] about How to Secure Your Cloud-based Applications From Cyber Security Attacks