Secure Internet Gateway: Have your DNS server controlled and covered?
Modern-day working environments have changed significantly over the years, and the IT landscape has evolved along with them. Digital transformations have now necessitated the need for cloud technology...
View ArticleStill On XP? Here Is Some Advice
We would never advise using an unsupported operating system. Everytime Microsoft issues a security patch for its supported OSs, it provides information that hackers can analyze and exploit against the...
View ArticleHackers, The Dark Side Of The Tech Revolution
When I read about hackers and cyber criminals I often think of the old TV show Get Smart. After vanquishing a villain, Agent Maxwell Smart would often recite a lament that typically went “If only he...
View ArticleFebruary’s Gone. But Not Forgotten.
If you happen not to have been a frequent reader of the Blog contributions I’ve published within the Social Media section of Xcitium’s Web site (and picked up on Xcitium’s Facebook page), here’s your...
View ArticleXcitium Discovers Equifax Executives’ Passwords For Sale On The Dark Web
Following the Equifax data breach revelations, the Xcitium Threat Intelligence Lab undertook a Dark Web analysis on the company and discovered that more than 388 records of Equifax user and employee...
View ArticleUPS Data Breach: Brown Frown
Another day, another high profile data breach! UPS became the latest company this week to announce a breach of customer cardholder and personal information. Fortunately, this may be the most limited of...
View ArticleOpenSSL Updates Fix Critical Security Vulnerabilities.
OpenSSL, the popular open source implementation of the SSL protocol, has released updates patching nine issues that including several critical security vulnerabilities. This includes issues that can be...
View ArticleHow Do Endpoint Security Management Operate?
Understanding Endpoint Security Management Organizations contain sensitive or important data. This data is usually accessed by their respective employees using several devices. Some of which might be...
View ArticleObama And Romney Finally Agreed On Something
November 6th is upon us, which in the United States means it is Election Day. And it isn’t just any Election Day but for the position of President of the United States. For months on end the 2012...
View Article8 Questions To Ask When Considering Cybersecurity Solutions
As companies continue to adjust to the evolving digital landscape, there’s one problem that continues to thwart company growth: cyber attacks. With the cost of data breaches rising year over year,...
View ArticleQR Code Manipulation – The Rising Threat Of Phishing Attacks
“The ideal, innovative, and socially supporting invention may get its birth for human evolution. Hence, after being popularized, the same invention profits not just its creator but also miracles the...
View ArticleFight Against Network Security Information Threats – Top Protecting...
Each year we witness the shocking, alarming, and beyond predictions growth in cyber attacks. Even though there is much insightful and helpful data available on the internet concerning security...
View ArticleFuture Cybersecurity Incidents: A Near Certainty and the Urgent Need for Zero...
The recent assertion by the U.S. policy arm of a global computing society that future cybersecurity incidents are “almost a certainty” is a sobering reminder of the challenges we face in an...
View ArticleCyberattack at Port of Seattle: A Stark Reminder of the Growing Threats to...
The recent cyberattack on the Port of Seattle is yet another alarming reminder of the escalating threats facing critical infrastructure across the globe. As one of the busiest ports in the United...
View Article4 Essential Cyber Hygiene Practices to Strengthen Your Organization’s Digital...
In today’s digital landscape, where cyber threats are increasingly sophisticated and pervasive, maintaining strong cyber hygiene practices is more critical than ever. Cyber hygiene refers to the...
View ArticleCompanies Grapple with Expanding Cyber Rules: Navigating the New Compliance...
As cyber threats continue to rise in both frequency and sophistication, governments and regulatory bodies around the world are responding with increasingly stringent cybersecurity regulations....
View Article