CIPHER Blog

Welcome to our Blog!

In the CIPHER blog, you will find the best articles on information security, trends in technology, digital threats, and cyber attacks. Our team of security experts, a multidisciplinary group of professionals, are dedicated to addressing security incidents and failures in this blog discussion.
 
If you want more information about one of the posts published here or contact the author, send an email to contact@cipher.com.
 

         
Information Security Eclipse – Watch for These Security Eclipses

Information Security Eclipse – Watch for These Security Eclipses

The masses are gearing up for the event of the decade! Solar eclipse sunglasses have sold out in stores across the country, and the price for these...

read more
Overcoming PCI DSS Challenges: Maintaining Compliance With Checklists & Inventories

Overcoming PCI DSS Challenges: Maintaining Compliance With Checklists & Inventories

Compliance with the standards required by the payment card industry, more specifically PCI DSS, is often challenging for many of the professionals...

read more
6 Questions to Ask About the GDPR

6 Questions to Ask About the GDPR

Businesses and organisations are preparing for the requirements which will soon be imposed through the enactment of the General Data Protection...

read more
Phishing Schemes Are Nastier Than Ever in 2017

Phishing Schemes Are Nastier Than Ever in 2017

Phishing is fraud, and in 2017 the schemes are nastier than ever. It can encompass identity theft in a way, posing as someone or something the sender...

read more
5 Effective Ways to Prevent a Data Breach

5 Effective Ways to Prevent a Data Breach

High-profile data breaches remind us all that data security is a top priority for businesses. If you recently read our security ROI blog, you might...

read more
10 Cyber Security Metrics You Should Be Monitoring

10 Cyber Security Metrics You Should Be Monitoring

Peter Drucker's maxim, considered the father of modern management, sums up how continuous improvement of any project is only met with well-defined...

read more