Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Dangers of Posting Your COVID-19 Vaccine Card

Dangers of Posting Your COVID-19 Vaccine Card

Dangers of Posting Your COVID-19 Vaccine Card The COVID-19 vaccine is being rolled out. The fortunate people that receive it are understandably grateful and happy. In this celebratory spirit, they snap a smiling picture with the evidence of the vaccine in hand. What...

+ Learn more
The Different Players in Social Engineering

The Different Players in Social Engineering

The Different Players in Social Engineering Most people inherently trust others, unless given a reason not to. This element of human nature makes it possible for social engineering to occur. Social engineering occurs when a person uses psychology and persuasion to...

+ Learn more
Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked

Three Ways You Can Unknowingly Get Hacked Email, text messaging, and phone calls are common and known vectors for attacks. Nowadays, humans engage with each other through countless channels. In certain situations, people might drop their guard and do activities that...

+ Learn more
A Vishing Scam Explored

A Vishing Scam Explored

A Vishing Scam Explored Author: Bill Bowman is Director of Marketing, North America at Cipher Phishing is the term for fooling someone into giving sensitive information or credentials via email. This blog, and many others, have written on the topic extensively. Scams...

+ Learn more
Secure Your Git Directory

Secure Your Git Directory

Secure Coding Tip Using Git Author: Lucas Davis is Red Team Senior Analyst at Cipher Developers use special tools to track the versions of code and then publish the code to production. Git is a popular program for accomplishing this. According to its website, "Git is...

+ Learn more
Two Ways to Hack the Supply Chain

Two Ways to Hack the Supply Chain

Two Ways to Hack the Supply Chain The combination of holiday shopping and a vaccine for COVID-19 have illustrated the importance of supply chains like never before. Goods get to market through supply chains. This post will look at two ways the different elements of a...

+ Learn more

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.