Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare

Securing Internet-Connected Devices in Healthcare The theme for the third week of 2020 Cybersecurity Awareness Month is "Securing Internet-Connected Devices in Healthcare". In 2020, as the COVID-19 pandemic has raged, many hospitals have suffered the added blow of...

+ Learn more
Securing Devices at Home and Work

Securing Devices at Home and Work

Securing Devices at Home and Work The theme for the second week of 2020 Cybersecurity Awareness Month is "Securing Devices at Home and Work". This theme is very appropriate for 2020, as the professional world shifted from using devices at work to using devices at...

+ Learn more
Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise

Cipher Podcast: Deep Dive into Business Email Compromise We are kicking off Cybersecurity Awareness Month by investigating a scam technique that has resulted in $26 billion in loss since 2013. This technique is Business Email Compromise (BEC). Attackers compromise or...

+ Learn more
Business Email Compromise

Business Email Compromise

Business Email Compromise We are kicking off Cybersecurity Awareness Month by looking at a pervasive scam technique that criminals have used for years in order to defraud companies and individuals. This scam is known as Business Email Compromise, also referred to by...

+ Learn more
Proactive Vulnerability Alerting

Proactive Vulnerability Alerting

Proactive Vulnerability Alerting Every company uses computer software that is critical to their business. The more complex the software solution, the greater number of developers that are required to build and maintain the source code. Inevitably mistakes will be made...

+ Learn more
Cipher Named a Top 5 Pure Play MSSP

Cipher Named a Top 5 Pure Play MSSP

Cipher Named a Top 5 Pure Play MSSP Cipher was named the #25 MSSP globally, in MSSP Alert's annual ranking. Amongst pure-play MSSPs, Cipher came in at #5. Cipher was ranked as the #4 MDR provider as well. This year, the company that determines the ranking added 50...

+ Learn more
How to Disable XML-RPC in WordPress

How to Disable XML-RPC in WordPress

How to Disable XML-RPC in WordPress Author: Jonathan Willian Coradi is a Red Team Services Consultant at Cipher XML Remote Procedure Call (XML-RPC) is a remote communication interface used by WordPress enabled by default since version 3.5. It allows communication...

+ Learn more

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.