Blogs

Share
April 17, 2014

According to a secret document provided by whistleblower Edward Snowden, the NSA tracks down the private email and Facebook accounts of system administrators before hacking their computers to gain access to the networks they control. Why do they do this? To gain privi...

Share
April 15, 2014

The discovery and fallout of the Heartbleed vulnerability has everyone scrambling to change the passwords to a myriad of online services (as we ...

Share
April 11, 2014

The Internet – and every company that uses it – is currently facing one of the most serious security flaws in its history.

Think that’s hyperbole?  Here’s what renowned security expert Bruce Schneier, not know for over stating things, recently said about the bug...

Share
April 08, 2014

What better way to take your brand viral than Twitter, Facebook, YouTube and LinkedIn, right? They’re fast, popular and we can open two-way dialogue on any topic-of-the-day. The whole marketing industry has taken to these channels to build brands. You know who else is paying attention? The...

Share
April 04, 2014

In nature, watering holes provide predators with the perfect location to hunt and stalk their prey. Animals congregate around the holes, while the predators lurk and wait for the perfect opportunity to launch an attack.

This same con...

Share
April 03, 2014

by Yariv Lenchner

The North American Electric Reliability Corporation (NERC) recently approved the latest version of the Critical Infrastructure Protection (CIP) standards....