Category Archives: Technology

Netizen: What is Security Information and Event Monitoring (SIEM)?

Ever wonder how your organization can immediately upgrade its security infrastructure? What about all the traffic and logs generated from devices and users on the network? Security Information and Event Monitoring (SIEM) combines security information management (SIM) and security event management (SEM) into one tool that provides insights into an organization’s traffic and user behavior. […]
Read More »

Netizen Penetration Testing Guide

Cyberattacks have become an increasingly tricky issue plaguing small and medium-sized businesses in recent years. Hackers as far as halfway across the world or two states over are leveraging unpatched vulnerabilities to steal data, damage reputation, or extort a small business for as much money as possible. In 2021, The United States FBI disclosed that […]
Read More »

Zero Trust Security: A new blueprint to fight cybercrime.

This past year was one like no other. Masks became the new fashion norm, workers traded office life for remote work, and video meetings became our main vessel for communicating with one another. While the world was busy fighting one issue, another swiftly arose. Cyber crime is on the rise across the globe. According to the F.B.I. in 2020 internet and […]
Read More »

Microsoft Exchange Hack: What happened and what we learned.

On March 2nd 2021, tech giant Microsoft announced that they had uncovered major vulnerabilities in their popular mail server Microsoft Exchange. In a later statement, Microsoft announced that a Chinese-backed group known as Hafnium had begun exploiting these vulnerabilities which lead to an immediate response from Microsoft to warn all Exchange users. Shortly after this […]
Read More »

The Issue With Cloud Databases

Minimize your risk and assume the worst when considering your exposed data. Consider what the likelihood and impacts of the loss of your data would be, and implement security controls in accordance with that level of risk.

The Key to Compliance: Vulnerability Assessments

Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach.

FDA plans to improve medical device cybersecurity

The US Food and Drug Administration (FDA) plans to tackle security issues related to medical devices and has released a plan of action it means to implement in the near future. Read More………….

AI a threat to cyber security, warns report

Artificial intelligence is being incorporated into a range of cyber security products, but the technology may also introduce new threats, a report warns Artificial intelligence (AI) poses a range of threats to cyber, physical and political security, according to a report by 26 UK and US experts and researchers. The Malicious use of artificial intelligence report examines the […]
Read More »

Cybersecurity Has a Serious Talent Shortage. Here’s How to Fix It

It’s a refrain I’ve been hearing for the past 18 months from clients all over the world: “We need more skilled people for our security team.” The need is real and well-documented. A report from Frost & Sullivan found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. But […]
Read More »

AI-Powered Cybersecurity Bot on Display at Smithsonian

A bot named Mayhem was created by a Pittsburgh-based company to use artificial intelligence to detect and defend against attacks. (TNS) — Museums are often catalogues of the past. But a new exhibit at the Smithsonian’s National Museum of American History will showcase the possible future of cybersecurity. Mayhem, a cybersecurity bot that uses artificial […]
Read More »