Digital Forensics & Cyber Security Blog
Digital Forensics & Cyber Security Blog
Curious Study: Are you in it for the business or just the money?
How a business markets its goods and services depends on whether it wants to make a quick sale or if it wants to take time to build a strong customer base for future sales. Transactional vs. relationship marketing: Key differences Some companies thrive on building strong relationships with customers, while [...]
Eight (8) examples of AI personalization across industries
It is through this combination of AI and content marketing that organizations have achieved an even more in-depth look at their potential customers and current users through hyperpersonalization. Hyperpersonalization Through hyperpersonalization, organizations can build a unique profile of individual users and customers and have that profile learn and adapt over [...]
Brain teasers and other fun tips for learning Python
Learn about some interesting ways Python coders can grow their skills in the language and the importance of connecting and learning from others in the community. So, what does a Python brain teaser look like? Check out this example from Python Brain Teasers by Miki Tebeka, published by The Pragmatic [...]
Enterprise IT Security and the Impact of COVID-19
Understaffed enterprise IT security teams struggle to keep up with COVID-19 pandemic challenges 114% increase in remote workers 59% increase in BYOD adoption 73% seeing increase in third-party risks 3 out of 4 prefer cloud-based security solutions Get the full report here: https://thycotic.com/resources/covid-19-pandemic-impact-on-enterprise-it-security-study/?utm_medium=Internal-Email&utm_source=Pardot&utm_campaign=Executive-Report-Impact-of-Covid-on-Enterprise-IT-Teams*Business-Case-for-PAM&utm_content=NAM-Prospects&utm_term=201125_Impact-of-Covid-on-Enterprise-IT-Teams_NAM-Prospects_Email-1
What information is worth sending to a cloud or on-premises data store for later use?
edge analytics Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other device instead of waiting for the data to be sent back to a centralized data store. Edge analytics has gained attention [...]
Can You Spot A Phishing Scam?
Get Savvy During Cybersecurity Awareness Month Every day, thousands of people fall victim to fraudulent emails, texts and calls from scammers pretending to be their bank. And in this time of expanded use of online banking, the problem is only growing worse. Online scams aren’t so scary when you know [...]
Shopify – Data Breach – Inside Job
Canadian e-ecommerce company Shopify disclosed an insider threat incident Tuesday, but questions remain about the attack and how it was discovered. According to a Shopify forum post announcing the incident, "less than 200" of its merchants were impacted by a data breach scheme conducted by two insider threats employed at [...]
Crowdstrike: More Cyberattacks in the First Half of 2020 Than in All of 2019
According to a recent study conducted by cybersecurity firm CrowdStrike, recent threat activity throughout its customers’ networks has shown more intrusion attempts within the first half of 2020 than in all of 2019. This may be due to the pandemic and subsequent lockdown measures forcing employees to mass shift to [...]
The wind blew, the trees came down
You cannot fight Mother Nature and think you will win. Today we had severe wind storms. Salt Lake City is now in a state of emergency. This morning on the way to the office we drove by Liberty Park. A favorite and famous park in the city. Sadly over 100 [...]
Tennessee Welcomes First K-9 Dog to find Electronic USB Storage Devices
The Tennessee Bureau of Investigation (TBI) has a new tool in the fight against crime across the state. His name is Zeus, a 2-year-old, yellow Labrador Retriever with a special talent. He can sniff out electronic storage devices—like hard drives, flash drives, even micro SD cards less than a millimeter [...]