Navigating the Dual Impact of AI in Cybersecurity
Artificial Intelligence (AI) is set to be the newest ally for many companies, but it’s also set to be the newest threat.
On Your DMARC, Get Set, Go!
Google and Yahoo are requiring DMARC beginning in February 2024. So what does that mean for your organization, and how do you implement it?
The Race to CMMC Compliance: Understanding the DoD’s New Implementation Plan
The DoD just released a proposed rule for implementation of all CMMC requirements by October 1, 2026. The plan will be implemented in four phases.
Who is Watching You and Why?
In the musical words of Rockwell, 🎵 “I always feel like somebody’s watching me - and I have no privacy.” 🎵Who might be watching you through your webcam, and what can you do to stop it?
HTTPS is Secure (Except When it’s Not)
This may be an unpopular opinion: HTTPS is not secure, or at least not always. Let’s go back in time to review what HTTP and HTTPS are and are not - and some of the ways you can protect yourself online.
Exploring Human Errors in Cybersecurity
You may have thought that hackers wore black suits and rappelled off the roof to hack a company, but that only exists in Hollywood. In real life, human error remains one of the leading causes of cybersecurity breaches.
Data Breach 101: Actions to Take After a Breach
Data breaches are a significant concern here in the digital age. With technology advancing rapidly, hackers have been using various methods to gain sensitive information from unsuspecting individuals, organizations, and you.
#Secure: Locking Down Your Social Media in Style
Social media platforms are essential tools for personal and professional communication. The increasing number of cyber threats means protecting your accounts has become paramount.
Keep Calm and Check Your Public Wi-Fi Connection
When it comes to public Wi-Fi, it is “better to be safe than sorry.” Read our guide and secure your Wi-Fi connection when you travel.
Let’s Not Get Smished
Email isn't the only way hackers try to get your information. They can also use text messages to entice victims to click on links in scams known as “smishing.”
Black Friday and Cyber Monday Cyber Scams on the Rise
Holiday shopping season is upon us, but it may not be so jolly if you take risks when shopping online. Read our guide for how to stay safe when shopping for gifts this year!
RFID: Is it Secret? Is it Safe?
RFID technology is used in a plethora of modern applications. Is it secure, and what should we actually worry about?
Applying Heuristics in Cybersecurity
Using heuristics in cybersecurity is a bad idea...except when it's not. We look at what heuristics are, how to leverage them in a meaningful way, and how to avoid their pitfalls.
The Dangers of QR Codes
The recent rise in QR codes allows for easy access to information - including yours. So are QR codes dangerous, and what can you do to protect yourself?
Password Hygiene: LastPass Edition!
A recent scare for LastPass has many people wondering: are password managers worth it, and what can I do to protect my information better?
Q&A Follow-up from “Risk Assessment on the Shoulders of Scientists”
We received a number of follow-up questions during our Hive Live workshop “Risk Assessment on the Shoulders of Scientists” and we’ve got detailed answers!
Experts Agree This is the Best Way to Protect Your IT Devices
Identify. Evaluate. Remediate. Validate. Repeat.
What’s an IT Budget and How Much Should I Spend on Cybersecurity?
We break down the steps to proper IT budgeting that will keep your company in business.
Cybersecurity’s Newest Advocate: the CFO
Investment and cybersecurity risk quantification have joined forces to better protect your organization. Are you ready?
A New Career Could Mean a Stolen Identity
Job scams are all too real, and somebody could use all your personal information you put on the application to steal your identity. Check out our list of ways to avoid having your job hunt turn into a job nightmare!