CIPHER Blog

Welcome to our Blog!

In the CIPHER blog, you will find the best articles on information security, trends in technology, digital threats, and cyber attacks. Our team of security experts, a multidisciplinary group of professionals, are dedicated to addressing security incidents and failures in this blog discussion.
 
If you want more information about one of the posts published here or contact the author, send an email to [email protected].
 

         
Next Generation Antivirus (NGAV) vs Traditional Subscription Antivirus

Next Generation Antivirus (NGAV) vs Traditional Subscription Antivirus

Traditional antivirus programs have been the primary means of protecting endpoints since the late 1980s, where digital threats are detected through...

read more
The Security Unicorn - Finding Skilled Practitioners

The Security Unicorn - Finding Skilled Practitioners

You’re looking for someone to lead your security program. They need to have these qualifications:

read more
Severe WPA2 Security Flaw May Put ALL Your Wi-Fi Devices at Risk

Severe WPA2 Security Flaw May Put ALL Your Wi-Fi Devices at Risk

Security experts and researchers have identified and confirmed a severe WPA2 security flaw that could affect literally ANY Wi-Fi connected device, from...

read more
Mitigating and Managing IoT Security Challenges

Mitigating and Managing IoT Security Challenges

The Internet of Things (IoT) is now one of the biggest technology revolutions in decades. IoT has created a roughly $967 billion market with expected...

read more
PCI DSS Requirements Become Mandatory in 2018

PCI DSS Requirements Become Mandatory in 2018

Your company processes, stores, or transmits payment card data passed the PCI DSS compliance validation process and met all requirements successfully....

read more
Top 5 Challenges for PCI DSS Compliance

Top 5 Challenges for PCI DSS Compliance

To achieve compliance with the PCI DSS compliance standard, you must overcome procedural, cultural and documentation challenges. It is not easy, but it...

read more