Privacy News: Apple refuses to comply with US Government’s request to unlock Pensacola suspect’s iPhones

The internet has lit up once again, heralding Apple’s decision to deny the US government a “backdoor” into their iPhone cryptography. Apple have outright disagreed with Attorney General William Barr, who stated that Apple have once again failed to provide law enforcement with what amounts to “substantive assistance” (unlocking password-protected iPhones) which were owned by […]

flareDNS: Malicious Crypto Mining DNS Blocklist Added

Crypto mining is grabbing headlines constantly. Sometimes it is for all of the wrong reasons. There is a huge online threat that is less publicized, and that is hackers stealing CPU (and/or GPU) power to mine cryptocurrency. There are cryptocurrency mining web sites that use javascript and script injections within browsers to generate revenue. Sadly, the […]

Matthew Rosenquist – Industry Recognized Cyber Security Expert, Evangelist and Strategic Advisor

Matthew Rosenquist is an innovative security expert with 30 years of experience, developing practical strategies for an ever-changing cyber landscape. A trusted board advisor and security expert for governments, organizations and academia, Matthew is one of the most well respected cyber security evangelists in the industry. Towards the end of 2019, you highlighted some dangerous […]

Geoff Hancock: Hands On Cyber Security Professional and Thought Leader

Geoff’s opinions and industry knowledge have been publicized worldwide in the Washington Post, and other mainstream media. His 25 years cyber security experience covers Military, IC, DHS and other federal agencies with 18 years across the commercial & Federal sector. Your current cyber security advisory roles encompass a myriad of infrastructures, operations and initiatives in both […]

Alyssa Miller : Hacker, security evangelist and cybersecurity professional

As part of our cyber security interview series, we had the pleasure of interviewing Alyssa Miller. Alyssa is a member of the Developer Relations and Community group at Snyk, and is responsible for providing industry and thought leadership on application security and open-source software security topics. Your role at Snyk must involve communicating security ideas […]

How Fortune 500 Companies Reduce A Cyber Security Analyst Salary By Up To 90% (Feb 2020)

The average cyber security analyst salary has increased 7% in the last three years. As far as scope, in the USA there is a current demand for 500,000 professionals in IT security. By 2022 the number of unfilled positions is expected to be at 1.8 million. This snapshot of the cyber security employment sector is […]

Data Security Solutions for Fintech Startups

The fintech sector has brought consumers an endless stream of modern offerings that have enabled them to ditch several outdated banking and lending products. Companies now have advanced B2B payment solutions at their fingertips, and online financial solutions have never been more convenient – largely thanks to the progress made by fintech startups. But, despite […]

Cyber Security Simplified- Part 2: Crypto Mining Malware

A SERIES OF INFOGRAPHICS TO HELP YOU UNDERSTAND CYBER SECURITY (IN PLAIN ENGLISH) Looking for a DNS blocking solution? Take a look at flareDNS… We have developed a DNS blocking solution that is suitable for businesses of all sizes, and offers – Adware Blocking The core feature of flareDNS. Network-wide ad blocking at DNS level […]

Cyber Security Simplified – Part 1: DNS Blocking

A SERIES OF INFOGRAPHICS TO HELP YOU UNDERSTAND CYBER SECURITY (IN PLAIN ENGLISH) Looking for a DNS blocking solution? Take a look at flareDNS… We have developed a DNS blocking solution that is suitable for businesses of all sizes, and offers – Adware Blocking The core feature of flareDNS. Network-wide ad blocking at DNS level […]

CybX Security Interviews Cyber Security Leaders & Professionals

As security professionals, we embrace new methodologies, strategies and analysis. To ensure we are always as close to the bleeding edge as possible, we diversify our knowledge base by networking with leaders in cyber security all over the world. We have been privileged to have met and engaged with some of the most influential people […]

Scroll to top
Do NOT follow this link or you will be banned from the site!
Cart Item Removed. Undo
  • No products in the cart.