Cyber

I2P network security threats

22 Jan: What is I2P?

It is not unusual for Dark Web markets to appear in many forms across different networks and platforms to expand their reach. More recently, however, markets are leaving the Tor network entirely and relaunching their illicit businesses in places like Discord, Telegram, and some are even considering I2P.
2019 data breaches

02 Jan: Most Impactful Data Breaches of 2019

Data breaches have been on a consistent rise year after year. Security teams need to implement a more robust strategy in order to detect data breaches and investigate further should one occur. Although it is forecasted that data breaches will continue to rise and become more complex in nature, there is still time to take control in 2020. 
Anatomy of Corporate Security

20 Nov: Anatomy of Corporate Security

Risks are not always the concern of one department which means operating in silos is no longer the most efficient approach to security. Many enterprises separate their security departments into physical security and information security, where adopting a converged security approach might be a more effective way to protect a company’s important assets.