by Liquid Video Technologies | Oct 30, 2020 | Access Control, Cybersecurity, Network Security, Security
Stay secure at work and home with these cyber defense tips. The line between our on- and off-line lives is shifting as technologies bring the internet into our workplaces, homes, and everywhere in between. IoT devices, cloud storage, multifactor...
by Liquid Video Technologies | Oct 26, 2020 | Access Control, Cybersecurity, Network Security, Security, Technology News
Security teams in the financial services sector are experiencing even more exacting demands as they defend their organizations in a world under a new and unexpected threat — a global pandemic, says a new Accenture report, “2020 Future Cyber Threats: The latest...
by Liquid Video Technologies | Oct 19, 2020 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach
OBSERVATIONS FROM THE FINTECH SNARK TANK What did you do when you heard about the 50th (or whatever number it was) data breach that occurred this week? Chances are you did two things: 1) Wondered if it impacted you, and 2) Went back to doing whatever you were doing....
by Liquid Video Technologies | Oct 12, 2020 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach
In a new report into the global cybersecurity industry’s exposure on the Dark Web this year, global application security company, ImmuniWeb, uncovered that 97% of leading cybersecurity companies have data leaks or other security incidents exposed on the Dark...
by Liquid Video Technologies | Oct 9, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Security Breach, Technology News
An adversary known for targeting the fintech sector at least since 2018 has switched up its tactics to include a new Python-based remote access Trojan (RAT) that can steal passwords, documents, browser cookies, email credentials, and other sensitive information. In an...
by Liquid Video Technologies | Oct 7, 2020 | Access Control, Cybersecurity, Data Breaches, Hacker, Network Security, Networking, Security Breach
Cybersecurity threats come in many varieties – criminals, nation states, malicious insiders, ransomware, phishing, malware…the list goes on and on. But just because there are a lot of moving parts to cybersecurity, it doesn’t mean you can’t be prepared to respond to...
Recent Comments