Honeypots, as the literal term suggests, are systems set up for luring an attacker into committing an offence in a controlled environment. Honeypots are an important part of the security infrastructure of organizations throughout the software industry. They are often set-up up as the entry-point of other systems. Honeypots have different use cases depending upon where they are … [Read more...] about How to Use Honeypots As A Security Measure
hackers
Understanding SDR-Based Attacks on IoT
IoT devices are ubiquitous today. Many of these devices use RFÂ based communication techniques to connect to other devices or to receive commands from remote controls in near field. Many devices like smart tube lights have dual mode operation, in which they connect over the internet for interfacing with a mobile app or via RF with a local remote. RF based communication interface … [Read more...] about Understanding SDR-Based Attacks on IoT
Why You Need Cyber Threat Intelligence
Cyber threat intelligence has become more and more a necessity for every business, no matter how large or small. There are a number of different methods you can implement in order to combat cyber threats, including cyber intelligence. This method involves learning about the various cyber-risks that could affect your business. By making use of cyber threat intelligence, you can … [Read more...] about Why You Need Cyber Threat Intelligence
Six Tips to Protect Your Data and Digital Assets from Hackers
Data loss and theft are serious matters for any business with digital assets such as customer information and applications. The reality is that something from as simple as a mistyped command on a production database to a malicious hack can result in catastrophic losses for a business. Consider for example how Gitlab lost six hours of unbacked-up customer code just because a new … [Read more...] about Six Tips to Protect Your Data and Digital Assets from Hackers
Sensitive Big Data Exposure and How to Avoid It
A few years back, big data was a tech jargon term understood by few outside the industry “ but not any more. During the last few years, the incredible potential of mining large datasets of increased volume, variety and veracity and at higher velocity has started to dawn on the rest of high-revenue generating economy sectors; nowadays the challenges posed by big data are on … [Read more...] about Sensitive Big Data Exposure and How to Avoid It