Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare The theme for the third week of 2020 Cybersecurity Awareness Month is "Securing Internet-Connected Devices in Healthcare". In 2020, as the COVID-19 pandemic has raged, many hospitals have suffered the added blow of...

Securing Devices at Home and Work

Securing Devices at Home and Work

Securing Devices at Home and Work The theme for the second week of 2020 Cybersecurity Awareness Month is "Securing Devices at Home and Work". This theme is very appropriate for 2020, as the professional world shifted from using devices at work to using devices at...

Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise We are kicking off Cybersecurity Awareness Month by investigating a scam technique that has resulted in $26 billion in loss since 2013. This technique is Business Email Compromise (BEC). Attackers compromise or...

Business Email Compromise

Business Email Compromise

Business Email Compromise We are kicking off Cybersecurity Awareness Month by looking at a pervasive scam technique that criminals have used for years in order to defraud companies and individuals. This scam is known as Business Email Compromise, also referred to by...

Cipher Podcast: Proactive Vulnerability Alerting with Cipher

Cipher Podcast: Proactive Vulnerability Alerting with Cipher

Cipher Podcast: Proactive Vulnerability Alerting with Cipher Vulnerability management is a critical task for IT teams. Every day, software companies release patches and new vulnerabilities are discovered. In this episode, we cover the ins and outs of how teams manage...

Proactive Vulnerability Alerting

Proactive Vulnerability Alerting

Proactive Vulnerability Alerting Every company uses computer software that is critical to their business. The more complex the software solution, the greater number of developers that are required to build and maintain the source code. Inevitably mistakes will be made...

Cipher Named a Top 5 Pure Play MSSP

Cipher Named a Top 5 Pure Play MSSP

Cipher Named a Top 5 Pure Play MSSP Cipher was named the #25 MSSP globally, in MSSP Alert's annual ranking. Amongst pure-play MSSPs, Cipher came in at #5. Cipher was ranked as the #4 MDR provider as well. This year, the company that determines the ranking added 50...

Cipher Podcast: DoD Cybersecurity Maturity Model Certification

Cipher Podcast: DoD Cybersecurity Maturity Model Certification

Cipher Podcast: DoD Cybersecurity Maturity Model Certification Over 300,000 companies in the US could become subject to the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) soon. This new certification is required for companies that do...

How to Disable XML-RPC in WordPress

How to Disable XML-RPC in WordPress

How to Disable XML-RPC in WordPress Author: Jonathan Willian Coradi is a Red Team Services Consultant at Cipher XML Remote Procedure Call (XML-RPC) is a remote communication interface used by WordPress enabled by default since version 3.5. It allows communication...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.