Home / Tags

Recent Inquiries


Phishing for Solutions: Are Cybersecurity Compliance Based Programs Working?

Phishing and spear phishing, i.e. social engineering, have rendered today’s users defenseless against increasingly sophisticated cyber-attacks. In 2016, the Director of National Intelligence (DNI) reported that 91% of all successful cyber-attacks against the Federal Government…

Roundtable: Tricking Neural Networks, CIA Impersonation, International Data Privacy, and Encrypted Malware Detection

In today’s episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles’ importance in the world of technology and cyber security.

Phishing – Simple Steps to Online Safety

Phishing is a malicious technique used to steal personal information. Malicious actors often use the stolen information for theft or blackmail. To protect your organization, follow a few guidelines: Train your users to spot email…