13 Jul

Cyber Security Is Rarely Considered When Buying IoT Devices

In today’s often-precarious security and privacy landscape, you’d think consumers would be taking security and privacy risks into serious consideration when purchasing new IoT devices. And you’d be wrong.

read more

Share this
06 Jul

IoT Labels to Help Consumers Distinguish Spy Devices

When hungry consumers want to know how many calories are in a bag of chips, they can check the nutrition label on the bag. When those same consumers want to check the security and privacy practices of a new IoT device, they aren’t able to find even the most basic facts.

Not yet, at least.

read more

Share this
29 Jun

Cloud-Based Services Are Under Attack by “Suspicious Superhumans”

Cyberattacks targeting corporate cloud services have increased significantly in the last few months as cyber criminals look to exploit the rise in remote working to gain access to corporate accounts.

read more

Share this
01 Jun

8 Cyber Security Startups to Watch in the Pandemic

The cybersecurity industry has experienced a rare silver lining of the COVID-19 economic collapse, recent studies show. Remote workers need new kinds of protection; healthcare organizations need defenses in a desperate time, and high-profile ransomware cases drive demand for new solutions.

read more

Share this
25 May

The Next Big Cyber Attack Is Happening Within 6 Months

The coronavirus is laying the groundwork for a massive cyber attack. In fact, we’ll see the largest cyber attack in HISTORY within the next six months.

read more

Share this
04 May

Cyber Security Forecasts and Market Estimates for 2020

Cyber security now dominates the priorities of every organization as each adapts to a post-COVID-19 world. Remote workers identities’ and devices are the new security perimeter.

read more

Share this
27 Apr

7 Secure Video Chat Apps

Who knew that video-conferencing apps would become such a big part of everybody’s lives so quickly? People around the world have swiftly pivoted from IRL socialising to Zoom, Houseparty, FaceTime, Skype and all the other video-chat apps out there.

read more

Share this
13 Apr
30 Mar

What Are Rootkits and Rootkit Attacks?

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyber threats today.

read more

Share this
23 Mar

How to Secure IoT Deployment During Talent Shortage

Businesses across industries are placing bigger and bigger bets on the Internet of Things (IoT) as they look to unlock valuable business opportunities. But there are concerns over the complexity of IoT security and its associated risks—to the company, its brands, and its customers. With the growing number and increased severity of IoT attacks, these organizations have good reason to be cautious.

read more

Share this

© 2017 Awontis. All rights reserved.