Blog

Blog

Escaping the echo chamber: How to make cybersecurity accessible for all

We’ve all experienced digital growing pains in the era of COVID-19. Whether it’s ordering food delivery off a smartphone for the first time or working through technical difficulties during a game of “Among Us” with friends, we’ve had to adapt to new ways of doing things online. Although most of our moves to digital channels have made our lives more frictionless, they’ve also brought many cybersecurity challenges. Many users struggle to access online tools due to physical and economic barriers

Read More >

3 Cybersecurity Resolutions to Survive 2021

Predicting a global pandemic that reshaped how we interact with each other and our devices at a fundamental level would be nigh impossible, but we have seen an acceleration in the shift to cloud-based services. This shows the adaptability of organizations looking to evolve and thrive during an unprecedented event. However, this shift has also left some businesses vulnerable to exploitation. My one-line forecast is that we should expect a cloud migration trend to continue or even accelerate in 2021

Read More >

User Emails Lost Before Launch of CurrentC

Emails were sent out last week to an undisclosed number of beta testers for CurrentC, the MCX alternative to Apple Pay (but also any company using NFC technology like Google Wallet), advising that unauthorized third parties had obtained their email addresses. The news came days after MCX retailers pulled in-store support for other third party payment systems. Not a huge breach, to be sure, but neither a great first branding step for a group that seeks to position itself as

Read More >

Home Depot – Right on Target? Not Quite.

The Home Depot breach could have been much, much worse. And the emerging details surrounding the breach have taken on a theatrical air. Similar Tactics, Different Haul In many ways, the breach perpetrated on Home Depot rings familiar to watchers of the Target breach. Point-of-Sale, or POS, machines were compromised by a version of the same BlackPOS malware used to infiltrate Target. Unlike that breach this attack had time to get nestled in as hackers skimmed data undetected from April

Read More >