Blog

Analysis of a Cyber Attack: Capital One

Analysis of a Cyber Attack: Capital One

Analysis of a Cyber Attack: Capital One By Jose Maria Blanco An attack on Capital One's cloud environment between March and July of this year compromised the personal data of approximately 100 million...

MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary Managed Security Service Providers (MSSPs) use specialized software to monitor the environment of companies they provide services for. Security Information Event...

Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security The Payment Card Industry (PCI) Security Standards Council has released a new alert. The alert warns of the threats of online credit card skimming to...

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware Ransomware has frustrated IT professionals and end-users since the '90s. In recent months, the technique has victimized government organizations. Ransomware is typically...

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity? Last week was Independence Day in the United States and Canada Day. These holidays celebrate freedom and independence. Security is a key component of independence. If a...

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication Communicating in a fast and modern way brings with it the possibility of privacy invasion and security concerns. Whether it be a large technology company snooping for...

10 Cybersecurity Metrics You Should Be Monitoring

10 Cybersecurity Metrics You Should Be Monitoring

Effective management of varying performance indices in information security can mean the difference between a practical and efficient project and a complete waste of money. Although managers have been...

5 Reasons Why You Need 24×7 Cyber Security Monitoring

5 Reasons Why You Need 24×7 Cyber Security Monitoring

5 Reasons Why You Need 24x7 Cyber Security Monitoring Hundreds and even thousands of security events can flood your network every hour of every day. Your team may have a significant challenge of sifting...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.

Are you ready to take your cybersecurity
to the next level?


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

The year is almost over. Look back at a cautionary list of the worst cybersecurity incidents from 2019. #cybersecurity https://zd.net/2DU1NBi


Social Media

Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 

Learn more

\