What Is the Braktooth Bluetooth Bug and Are You At Risk?

If you've ever poked your nose into the world of cybersecurity, you'll know that hackers tend to find crippling flaws in well-established technologies, opening up an exploit for hundreds of thousands of devices worldwide. Such is the case of the BrakTooth exploit, which aims to cause problems for Bluetooth devices around the world. In this […]

Continue Reading

The Risk of Compromised Credentials and Insider Threats in the Workplace

Compromised credentials and insider threats are a recipe for disaster when it comes to viable data security. The lack of resources, a rapid shift from traditional infrastructures to cloud-based models, and a huge influx of unmanageable IT accounts are all contributing to the growing data threats in the workplace of today. Let us now explore compromised […]

Continue Reading