
Copy Fail: Hype versus reality – the full story
The Copy Fail bug has attracted lots of copy-and-paste publicity lately. We tease the facts from the fiction.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

As cyber threats became more evolved and sophisticated, the cybersecurity industry responded by developing more complex technologies. These technologies included the ability to detect intrusions through behavioral analysis, as well as advanced technologies for determining patterns from numerous data sources that indicate a compromise or that an unauthorized user is lurking in an organization’s network. Each advancement improved the ability of cybersecurity professionals to combat cyber threats, but it also started siloing cybersecurity solutions. Eventually, multiple technologies and tools existed […]

Media headlines insisted that “RSA has been cracked.” But it hasn’t, so why did they say it had?


There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]

What sort of data collection is “fair and reasonable” when it’s your car doing the collecting?

Even if you’ve got cybersecurity covered in your own digital life, remember that friends don’t let friends get scammed!

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]

You’ve put a lock on your door. Why not add eight more, just to be sure? The cybersecurity industry will sell you as many tools as you are willing to buy, so why not run them all?

Learn what SOC 2 tells you about your suppliers, as well as how to make the most of the experience if you’re thinking of going for SOC 2 in your own business.

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Data breaches are at an all-time high, with the number of breaches almost doubling from 2022 to 2023. Most recently, CBS reported on a massive data breach that could likely contain the social security numbers (SSNs) of every US citizen. It’s a major leak of personally identifiable information (PII) and only adds to the amount of sensitive data, such as passwords and addresses, that has been leaked over the last decade. Although it’s easy to think that leaked PII in […]


Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

The cybersecurity vendor market is quite complicated and it’s easy to get lost in the acronym soup. Whether it’s to make their product sound different or just the proclivity of the tech industry to abbreviate everything, it can be incredibly challenging for non-security people to understand what’s important and what isn’t. Making matters worse, many of the services overlap, meaning that you can invest in two “different” services or platforms and end up getting the same thing in both. One […]

Startup valuations are the scoreboard of success, and the podium for winners is Unicorn Status—when a company reaches a valuation of $1 billion. Achieving unicorn status is the dream of any startup, and it typically signals the startup’s strong potential to either go through an IPO or become acquired by a larger firm in an M&A deal. A start-up achieves unicorn status if: Unfortunately, because it might have vulnerabilities that more established, public companies don’t, achieving unicorn status also puts […]

As cyber threats became more evolved and sophisticated, the cybersecurity industry responded by developing more complex technologies. These technologies included the ability to detect intrusions through behavioral analysis, as well as advanced technologies for determining patterns from numerous data sources that indicate a compromise or that an unauthorized user is lurking in an organization’s network. Each advancement improved the ability of cybersecurity professionals to combat cyber threats, but it also started siloing cybersecurity solutions. Eventually, multiple technologies and tools existed […]

Media headlines insisted that “RSA has been cracked.” But it hasn’t, so why did they say it had?

There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

What sort of data collection is “fair and reasonable” when it’s your car doing the collecting?

Even if you’ve got cybersecurity covered in your own digital life, remember that friends don’t let friends get scammed!

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]


You’ve put a lock on your door. Why not add eight more, just to be sure? The cybersecurity industry will sell you as many tools as you are willing to buy, so why not run them all?




Data breaches are at an all-time high, with the number of breaches almost doubling from 2022 to 2023. Most recently, CBS reported on a massive data breach that could likely contain the social security numbers (SSNs) of every US citizen. It’s a major leak of personally identifiable information (PII) and only adds to the amount of sensitive data, such as passwords and addresses, that has been leaked over the last decade. Although it’s easy to think that leaked PII in […]

Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

The cybersecurity vendor market is quite complicated and it’s easy to get lost in the acronym soup. Whether it’s to make their product sound different or just the proclivity of the tech industry to abbreviate everything, it can be incredibly challenging for non-security people to understand what’s important and what isn’t. Making matters worse, many of the services overlap, meaning that you can invest in two “different” services or platforms and end up getting the same thing in both. One […]

Startup valuations are the scoreboard of success, and the podium for winners is Unicorn Status—when a company reaches a valuation of $1 billion. Achieving unicorn status is the dream of any startup, and it typically signals the startup’s strong potential to either go through an IPO or become acquired by a larger firm in an M&A deal. A start-up achieves unicorn status if: Unfortunately, because it might have vulnerabilities that more established, public companies don’t, achieving unicorn status also puts […]


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






