background.png

The Cyber Feed

Protection Beyond the Perimeter Starts Here.

Posts by Topic

see all

Get Updates from Us!

What should we expect in 2017?

During an impromptu press conference on New Year's Eve, U.S. President-elect Donald Trump responded to a question about cybersecurity by stating that, "no computer is safe and if you have something ...

Read More

The IoT Boomerang Effect

Over 6 Billion devices currently make up the ever-growing network known as the IoT. In fact, Gartner is predicting that by 2020, IoT devices will grow to over 26 billion, constituting an exponential ...

Read More

Cybersecurity in 2017 focusing on Asia Pacific

I would like to share my final thoughts on 2016 and what I believe awaits us in 2017, particularly in the APAC market. Cybersecurity Awakening Following suit of the US and Europe, the Asia Pacific ...

Read More

Post Soltra Era - Our Quick Analysis

The story began in 2014, when FS-ISAC and DTCC, entered a joint venture to develop a product named Soltra. The idea was to streamline the process of aggregating threat intelligence from a wide range ...

Read More

FriendFinder ignored warnings, became next victim in the Cyberwar on Sex Industry

Back in July of 2015, Ashley Madison, a popular website dedicated to facilitating marital affairs, was hacked by a group called the Impact Team. The hackers demanded that Ashley Madison shut down ...

Read More

An Inside Look At The Hacker Communities of the Dark Web

Most hackers actually don’t fit the common stereotype of a hoodie-attired, jobless loner glued to a computer screen for days on end in a quiet basement.

Read More

BlackHat London 2016: Your opportunity to check how exposed your company is to digital threats

For four days at the start of November 2016, Europe’s top cybersecurity professionals and researchers will gather in London for Black Hat Europe.

Read More

Cyber Week in APAC – The region is taking the war on cybercrime seriously, very.

We participated in several events in Singapore and the Philippines last week, and saw firsthand a great curiosity about and commitment to brand protection at a time of rampant cyber-attacks. One ...

Read More

Ever Wondered which Tools and Services Are Found on the Dark Web? Here are Some Examples.

The Dark Web is where the sunshine of regulated commerce doesn’t apply. Here you can find criminals selling weapons, illegally harvested organs and child pornography, for example. Here is also where ...

Read More

From hackers with love. A look behind the scenes of cybercrime - Part 1

It’s not a crazy idea. Many organizations – including the U.S. Department of Defense, Google, Apple, General Motors and others – work directly with so-called white hat hackers. These outfits pay ...

Read More

SUBSCRIBE

download.jpg