Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Broken Link Hacking

Broken Link Hacking

Broken Link Hacking The Internet has been around for decades. Hyperlinks are a core element. So common nowadays, their existence is overlooked by the casual browser. When website visitors click a link, they trust that link will take them where they want to go. What...

+ Learn more
Cipher Podcast: The Future of Connected Devices

Cipher Podcast: The Future of Connected Devices

Cipher Podcast: The Future of Connected Devices We dive into the future of IoT and Internet-connected devices in this episode. The discussion comes in the form of a recording from a recent live stream with Prosegur USA's Director of IoT Greg Kuhn. Greg and the hosts...

+ Learn more
The Future of Connected Devices

The Future of Connected Devices

The Future of Connected Devices The theme for the final week of 2020 Cybersecurity Awareness Month is "The Future of Connected Devices". According to the organizers, "The final week of Cybersecurity Awareness Month will look at the future of connected devices. This...

+ Learn more
Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare The theme for the third week of 2020 Cybersecurity Awareness Month is "Securing Internet-Connected Devices in Healthcare". In 2020, as the COVID-19 pandemic has raged, many hospitals have suffered the added blow of...

+ Learn more
Securing Devices at Home and Work

Securing Devices at Home and Work

Securing Devices at Home and Work The theme for the second week of 2020 Cybersecurity Awareness Month is "Securing Devices at Home and Work". This theme is very appropriate for 2020, as the professional world shifted from using devices at work to using devices at...

+ Learn more
Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise We are kicking off Cybersecurity Awareness Month by investigating a scam technique that has resulted in $26 billion in loss since 2013. This technique is Business Email Compromise (BEC). Attackers compromise or...

+ Learn more
Business Email Compromise

Business Email Compromise

Business Email Compromise We are kicking off Cybersecurity Awareness Month by looking at a pervasive scam technique that criminals have used for years in order to defraud companies and individuals. This scam is known as Business Email Compromise, also referred to by...

+ Learn more
Proactive Vulnerability Alerting

Proactive Vulnerability Alerting

Proactive Vulnerability Alerting Every company uses computer software that is critical to their business. The more complex the software solution, the greater number of developers that are required to build and maintain the source code. Inevitably mistakes will be made...

+ Learn more

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.