Blogs
Latest blogs on experience insights, industry perspectives, hobbies and more. portal dedicated to store all blogs and develop copy-writing skills.
Why Passwordless Authentication Is the Future - Keeper Security Webinar
The future is trending more and more towards a fully end-to-end passwordless authentication process. Join Johnathan Padilla and Adrien Julienne from Keeper Security to learn how organizations can move to a passwordless future with passkeys, SSO and biometrics.
What Is Shadow IT and How Can Organizations Eliminate It?
Shadow IT can increase your organization’s attack surface and make you more vulnerable to supply chain attacks, among other risks. Unregulated or unvetted software can also hamper compliance efforts and cause integration issues with your “approved” IT systems. Learn more about how to protect form shadow IT.
Ransomware Attacks Strike Fear in US Hospitals
On June 15, 2023, the residents of Spring Valley, IL woke up to the sobering news that St. Margareth’s Health hospital, one of only a few hospitals in the region, would be closing. The cause of the closure? A devastating cyber attack.
TikTok’s Data Collection And What It Means For Cybersecurity
Learn about TikTok's data collection and why it's a cybersecurity risk, how threat actors can use the collected data and how to protect yourself.
Elliptic Curve Cryptography in Cybersecurity
ECC is a public-key cryptography method based on the mathematics of elliptic curves. First proposed in 1985, it recently rose to prominence with modern cryptography as it provides a higher level of security compared to traditional encryption methods.
KCM: From the original developers of Apache Guacamole
In February of 2021, one of the operators at the City of Oldsmar’s water treatment system noticed a change in the water supply. The level of sodium hydroxide was abnormally high, which would have been lethal for residents if ingested in large amounts.
The Cyberwar on Small Businesses
As the world continues to change, so does the nature of warfare, where the Internet has become the main battleground for most of the world’s conflicts. But where is this headed?