Quantcast
Channel: blog – Xcitium Blog
Browsing all 16 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Secure Internet Gateway: Have your DNS server controlled and covered?

Modern-day working environments have changed significantly over the years, and the IT landscape has evolved along with them. Digital transformations have now necessitated the need for cloud technology...

View Article


Still On XP? Here Is Some Advice

We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can analyze and exploit against the...

View Article

Hackers, The Dark Side Of The Tech Revolution

When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that typically went “If only he...

View Article

February’s Gone. But Not Forgotten.

If you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media section of Xcitium’s Web site (and picked up on Xcitium’s Facebook page), here’s your...

View Article

Xcitium Discovers Equifax Executives’ Passwords For Sale On The Dark Web

Following the Equifax data breach revelations, the Xcitium Threat Intelligence Lab undertook a Dark Web analysis on the company and discovered that more than 388 records of Equifax user and employee...

View Article


UPS Data Breach: Brown Frown

Another day, another high profile data breach! UPS became the latest company this week to announce a breach of customer cardholder and personal information. Fortunately, this may be the most limited of...

View Article

OpenSSL Updates Fix Critical Security Vulnerabilities.

OpenSSL, the popular open source implementation of the SSL protocol, has released updates patching nine issues that including several critical security vulnerabilities. This includes issues that can be...

View Article

How Do Endpoint Security Management Operate?

Understanding Endpoint Security Management Organizations contain sensitive or important data. This data is usually accessed by their respective employees using several devices. Some of which might be...

View Article


Obama And Romney Finally Agreed On Something

November 6th is upon us, which in the United States means it is Election Day. And it isn’t just any Election Day but for the position of President of the United States. For months on end the 2012...

View Article


8 Questions To Ask When Considering Cybersecurity Solutions

As companies continue to adjust to the evolving digital landscape, there’s one problem that continues to thwart company growth: cyber attacks. With the cost of data breaches rising year over year,...

View Article

QR Code Manipulation – The Rising Threat Of Phishing Attacks

“The ideal, innovative, and socially supporting invention may get its birth for human evolution. Hence, after being popularized, the same invention profits not just its creator but also miracles the...

View Article

Fight Against Network Security Information Threats – Top Protecting...

Each year we witness the shocking, alarming, and beyond predictions growth in cyber attacks. Even though there is much insightful and helpful data available on the internet concerning security...

View Article

Image may be NSFW.
Clik here to view.

Future Cybersecurity Incidents: A Near Certainty and the Urgent Need for Zero...

The recent assertion by the U.S. policy arm of a global computing society that future cybersecurity incidents are “almost a certainty” is a sobering reminder of the challenges we face in an...

View Article


Image may be NSFW.
Clik here to view.

Cyberattack at Port of Seattle: A Stark Reminder of the Growing Threats to...

The recent cyberattack on the Port of Seattle is yet another alarming reminder of the escalating threats facing critical infrastructure across the globe. As one of the busiest ports in the United...

View Article

Image may be NSFW.
Clik here to view.

4 Essential Cyber Hygiene Practices to Strengthen Your Organization’s Digital...

In today’s digital landscape, where cyber threats are increasingly sophisticated and pervasive, maintaining strong cyber hygiene practices is more critical than ever. Cyber hygiene refers to the...

View Article


Image may be NSFW.
Clik here to view.

Companies Grapple with Expanding Cyber Rules: Navigating the New Compliance...

As cyber threats continue to rise in both frequency and sophistication, governments and regulatory bodies around the world are responding with increasingly stringent cybersecurity regulations....

View Article
Browsing all 16 articles
Browse latest View live