SecuriThings is a fully managed IoT security solution that monitors the ever-so-vulnerable cloud-connected IoT devices. In this fascinating interview, VP Marketing Yotam Gutman reviews the most challenging aspects of IoT security.
Initech CEO reveals the difficulty in applying security standards on modern applications, and explains why these challenges are hardly ever technical.
Please provide some background on the company: what inspired you to start a VPN service and how did it come together? We started our business in 2006. Back then, VPNs were used by private companies to protect their local networks. VPN services were not circulated yet, and there were no more than about 50 VPN...
What’s brought you to focus on Connected cars security initially? Although Internet connectivity can make vehicles safer and more efficient, embedded connectivity exposes the vehicle to potential cyber attacks. Essentially, the more sophisticated vehicles become, the more prone they are to attack. Argus’ mission is to secure private and commercial vehicles from cyber-attacks. This is...
Gulf Information Security Expo & Conference (GISEC) was launched in 2013 with the aim to bring the region’s leading cybersecurity and information security pioneers together in one place, to share their knowledge and expertise on best practices to tackle increasing cyber threats and IT security vulnerabilities amid the rapid rise in connectivity and digital transformation across industries and society. In this blog post, spokesperson Michael Champion, the Show Director, gives a sneak preview to what GISEC is all about.
In BIT WARS: Hacking Report: Top Hacks and Attacks of 2015 Dr. Thomas Hyslip presents a concise review of the year's top hacks and attacks, featuring Ashley Madison, OPM, Anthem, IRS, Premera Blue Cross, and others. Knowing the details of how these hacks occurred and who committed them, regardless of whether or not you're a victim, gives a good understanding of how to protect yourself from future attacks. We sat down with Dr. Hyslip to ask him a few questions, and were honored to get a free copy of the book for all of our readers for the next 3 days. Hurry up!
Want to get Hotspot Shield but don’t know how? We take you through the process of downloading and installing it step-by-step. Step 1: Open a Hotspot Shield Account If you only want the free version, skip to step 2 below. Personally, I tend to be suspicious about free VPN services, but if all you’re going...
Robert Ryerson entered the financial industry in 1984 when he went through training to be a “stockbroker”, as they were then called, for Shearson Lehman American Express in the World Trade Center in NYC.  He broadened his efforts in the field by becoming a Certified Financial Planner (CFP) in 1991.  More recently, he became concerned about the epidemic of identity theft, and became a Certified Identity Theft Risk Management Specialist (CITRMS). Last year he published the book “What’s the Deal With Identity Theft-A plain English Look at Our Fastest Growing Crime,” which is available as an e-book and paperback on Amazon. In this blog post, Ryerson gives vpnMentor readers a sneak preview to the eleventh chapter of the book, which talks about some emerging trends in the fight against identity theft. So grab your cup of coffee and let's get to it.
NordVPN claims to be the world's most advanced VPN. It has been recommended by a number of platforms, including pcmag.com editor's choice and our readers 2nd best choice. In this article I am going to show you how to open an account with Nordvpn and configure their software on a windows desktop.
Sixgill is an Israeli Cyber intelligence firm that specializes in disruptive technology. Their main product, Dark-i, is designed to automatically gather relevant intelligence from within the dark web, disrupt malicious communications, and even get criminals arrested. In this article, I was honored to interview the brilliant mind behind Sixgill, CEO Avi Kasztan, and get a taste of the great mystery called the Dark Web.