Remember the 1995 movie, The Net? In the scene post her stolen identity, the protagonist, a computer programmer, says the most unthinkable thing, “Our whole world is sitting there on a computer. It’s in the computer, everything … is stored in there. It’s like this little electronic shadow on each and every one of us, […]
Read More5 IT Security Best Practices Against Cyber Bank Heists
Data breach cases in banks are rapidly growing. Cyber bank heists such as the Bangladesh Central Bank case and the data breach in Union Bank of India raised questions about data security in the banking industry. Recently, a sophisticated malware was able to steal more than $350,000 from ATMs in Thailand. Reports of interbank […]
Read MoreHacking The IoT (Internet of Things) Era
The Internet of Things might as well be called the Internet of Vulnerabilities. Here are the new vulnerabilities that are unintentionally caused by IoT, especially now that security compliance is not yet required among connected devices.
Read More5 Security Research Statistics Every CEO Needs in 2016
Concern for IT security has come to the forefront of every organization in 2015, with 76 percent of companies ranging from US business executives, law enforcement services, and government agencies saying that they are more concerned about it now compared to 59 percent in 2014. More corporations have come to realize that it’s no longer […]
Read MoreHow to Choose the Best Database Management System for Your Business
Having the right kind of database management system for your business allows you to achieve your goals. Here’s a guide to help you choose the right one for you.
Read More