
What is Data Center Security? Top 5 Best Practices
Cloud computing and technology have truly revolutionized the way we collect, process and store data. Organizations are increasingly moving their entire infrastructure to the cloud, storing their information in safe, encrypted data centers.

Security Theater: Are You Feeling Secure or Actually Being Secure?
The increase and intricacy of cyber threats show no sign of slowing. Headlines highlight new data breaches almost every day, proving that the need for cybersecurity has never been more apparent than it is right now.

Types of Cybercrime and How to Protect Yourself Against Them
The Internet is not a safe place. Cybercrime is growing at the same rapid rate as new people getting connected to the digital world.

Cyber Security Culture: Why It Matters for Your Business
As much as technology has grown with cloud computing, IoT devices and new software applications, organizations have in turn created a larger attack surface that opens the door for more potential cyber attacks.

Cybersecurity with Mergers and Acquisitions: Find Vulnerabilities Before They Become Yours
All digital assets, including network systems, data and the way it's stored and protected, are the foundation of any successful business. That's why they can pose a significant business risk. The dependence of modern businesses on their digital records raises their potential vulnerability to security breaches.

Attack Surface: Concept, Types, Tools and Reduction Strategies
A while back we talked about the concept of OSINT, and how important it is to the infosec industry.

Cybersecurity Red Team Versus Blue Team — Main Differences Explained
When discussing cybersecurity, the terms "Red team" and "Blue team" are often mentioned. Long associated with the military, these terms are used to describe teams that use their skills to imitate the attack techniques that "enemies" might use, and other teams that use their skills to defend. In cybersecurity, there isn't much difference.

Top 5 Ways to Handle a Data Breach
With data breaches occurring regularly, people have become desensitized to them. This isn't good, since the protection of data has never been more important. Not only are business required to announce that a data breach has occured, they are also obligated to pay fines due to regulations in accordance with GDPR.

How to Improve Your Cyber Insurance Underwriting
Cyber attacks can and do happen, and they happen all the time. There are all kinds of different attacks and threats you can encounter on the Internet, to the extent that we've even written about the most common network security threats. This has inevitably led to cyber risk coverage as an important and growing market.

An Ode to White Hats: What Is Ethical Hacking?
The first thing that comes to mind when people hear a word “hacker” is some sort of criminal, someone we should be scared of when browsing the Internet. This shouldn’t worry true professionals, the “white hats”, as the number of people who understand the importance of their role in Internet safety just keeps growing. But the question remains: What is an ethical hacker?