Category: Blog

DropBox – Security Best Practices for External Sharing on Content Collaboration Platforms

The Security Best Practices for External Sharing on Content Collaboration Platforms blog series examines the state of security for external sharing on the leading Content Collaboration Platforms (CCP). Each week we’ll review a different platform and make security best practice recommendations. Background Dropbox was founded in 2007 by MIT student Drew Houston,

Cryptocurrency phishing attack nets over $1 million in a few hours

With tremendous money to be made in a short period of time, phishing has become commonplace within the cryptocurrency exchange world, particularly at the moment when a new currency comes along and debuts with its initial coin offering (ICO), an event not unlike an initial public offering with corporate stock.

Final day to vote!

PROUD TO BE ANNOUNCED AS FINALISTS! HTTPS://CYBERSECURITY-EXCELLENCE-AWARDS.COM/CANDIDATES/CLASSIDOCS-2 HTTPS://CYBERSECURITY-EXCELLENCE-AWARDS.COM/CANDIDATES/CLASSIDOCS-3 HTTPS://CYBERSECURITY-EXCELLENCE-AWARDS.COM/CANDIDATES/CLASSIDOCS-GDPRENGINE

Blockchain – More than coin…

I read an interesting article today about some of the activities occurring at Davos this week. Robert Shiller made some interesting comments (https://qz.com/1189516/robert-shiller-said-at-the-wef-in-davos-that-bitcoin-is-characterized-by-speculation/ ) – however mostly centered around bitcoin itself. For sure – it has been a bumpy ride – and outside of hype and other reasons for the sudden

Business E-Mail Compromise-Angriffe (Imposter) durch Betrüger lassen nicht nach

Business E-Mail Compromise(BEC)-Angriffe haben in den letzten Jahren zahlenmäßig zugenommen und werden von ihrer relativen Erfolgsrate angetrieben – verglichen mit anderen finanziell motivierten Angriffen. Sie scheinen recht einfach zu sein: Der Angreifer sendet dem ausgesuchten Opfer, das für gewöhnlich ein Mitglied des Finanzteams ist, eine E-Mail und fordert es dazu

Business Email Compromise (Imposter) Attacks Are Not Going Away

Business email compromise (BEC) attacks have been increasing in number over the last few years, driven by their relative success rate compared to other financially motivated attacks. They appear to be quite simple – the attacker sends an email to the intended victim, usually a member of the finance team,

Box – Security Best Practices for External Sharing on Content Collaboration Platforms

The Security Best Practices for External Sharing on Content Collaboration Platforms blog series examines the state of security for external sharing on the leading Content Collaboration Platforms (CCP). Each week we’ll review a different platform and make security best practice recommendations. Background Box is a California-based public company that was founded in

Blockchain and Data Security

Much has been discussed about Blockchain and Data Security and their significant impact to come. Much of my interest has been towards how to provide more authenticity to transactions and secure the history of content/data – to a forensic level if required for certain types of data (and who doesn’t