PCI DSS Compliance: Only 1 out of 3 Companies Are Properly Protecting Credit Card Data

“We’ve been breached, millions of records are in the hands of attackers, but don’t worry – we promise to do better.” This is a headline that has been published on a seemingly weekly basis over the las...
Read more

How to Defeat Ransomware in 4 (Somewhat) Easy Steps

With these 4 (somewhat) easy steps, even if your data is ransomed, recovery will become a matter of days rather than months, your recovery costs will drop drastically—and, bonus, customer opinion won'...
Read more

Why Every Black Person in Tech Should Attend AfroTech

It’s been a little over a week since I returned from Wakanda. No, not the fictional nation in the Marvel Comics series, but a real one. If you are familiar with Marvel's Black Panther, Wakanda is a fi...
Read more

The Striking Parallels of the Firewall and Blockchain

Thirty years ago, as a U.S. Department of Defense experiment called the internet was to be soon commercialized, companies started to focus on how to protect internal systems and applications from atta...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

The Spoils of Ransomware: Turns Out, Blockchain is for Hackers

Ransomware, one of the most flourishing and lucrative attack forms, generally demands payment in BitCoin due to its inherent anonymity and reliability—both found in the blockchain ledger. Since it see...
Read more

Capital One: Chronicle of a Data Breach Foretold

The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit card applications at Capital One. The story hit headlines for months, and with much reas...
Read more

Sharing Isn't Caring

Comfortable Breaches to Fit Any Lifestyle Do you travel? Do you prefer to drive or fly? Do you have a favorite hotel chain? Use the same entertainment methods from day to day? How long have you had th...
Read more

Cloud Vector – Cyber Illness, Infection, and How to Contain Them

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed child...
Read more

The Feedback Loop Inherent in GDPR

GDPR’s “right to be forgotten” has generated some concerning results. The limits and pitfalls of retrieving one’s Personally Identifiable Information (PII) is already creating ripples: being able to o...
Read more