How Blockchain Can Drive Legal Industry Forward

blockchain drives legal industry forward

Trust has always been a key instrument of economics. Up until recently, central banks have acted as the metaphorical custodian of trust, employing complex processes that force populations to participate in bank accounts and credit cards to earn trust benefits, like credit scores. Yet, devastating moments such as the 2008 U.S. financial crisis that took an enormous taxpayer-funded bailout showed the same centralized and slow processes were weakening and could not adapt quickly enough in a digital economy.

Read more

Security Risks of Using Google Add-Ons

What Are the Security Risks of Using Google Add-Ons

Google add-ons were introduced in 2014 as a way to bring additional functionality to Google Docs and Sheets by installing plugins published by third-party developers.

Add-ons can be browsed and installed directly from within G Suite by clicking the “Add-ons’ tab in the main menu of any document you’re working on. The fact that these add-ons are so easy to install and seem to be officially approved by Google may lull users into a false sense of security that they are as safe as using G Suite itself, but in fact third-party add-ons can introduce new security risks into your organization.

Read more

How Machine Learning Can Advance Cybersecurity Landscape

How Machine Learning Can Advance Cybersecurity Landscape

Businesses today are gathering huge amounts of data. Data is at the heart of just about any business-critical system you can think of. This also includes infrastructure systems. Today’s high-tech infrastructure, including network and cybersecurity systems are gathering tremendous amounts of data and analytics on most key aspects of mission-critical systems. While human beings still provide the key operational oversight and intelligent insights into today’s infrastructure, machine learning and artificial intelligence are gaining huge momentum in most areas of today’s systems, whether positioned on-premise or in the cloud.

Read more

How to Prevent CA Security Breaches

Compromised CA Certificate Attacks

Certificate authentication plays a major role in securing online resources, and most organizations utilize certificates to secure communication between both hosted resources and those that are accessed. It is a more secure way of authenticating users compared to the legacy username and password mechanism. Certificate authentication uses asymmetric cryptography, meaning that it is able to separate out 1) those who can verify the link between the physical identity and the cryptographic public key and 2) Those who can authenticate the user. However, user certificates are only as good as the Certificate Authorities, or CAs, that identify them. Attackers have certainly targeted the CAs as a means to issue unauthorized certificates or impersonate certificates for authentication. Let’s take a look at compromised CA Certificate attacks and their impacts.

Read more

How to Boost Cloud Security via Machine Learning-powered Cyber Threat Intelligence

how to boost cloud security via machine learning cyber threat intelligence
In the previous post, we looked at Machine Learning (ML) and Artificial Intelligence (AI) in general terms. Machine learning and artificial intelligence are both extremely powerful technology buzzwords these days when it comes to parsing through the enormous amount of data that is readily available to today’s systems. Machine learning is a specialized form of AI that allows computers the ability to “learn” from data automatically.

Read more

G Suite Security: Top 5 Risks to Avoid

G Suite Security 0 12290

g-suite-security-risks

G Suite has revolutionized the way we work for many individuals and organizations. Let’s take a deep dive into G Suite security best practices to safeguard your corporate data. Gone are the days of accidentally saving over an existing file by mistake, losing hours of work because you forgot to save your document, or emailing files back and forwards between colleagues.

Google provides a full suite of tools for word processing, working with spreadsheets, creating websites, and communicating and collaborating with others. All data is saved to the cloud in real-time so you don’t have to worry about losing your work by accident and earlier versions of files are available too. You need to implement extensive G Suite security policies within your organisation to ensure security and compliance requirements are duly met/

Read more

Key Insights on Cybersecurity Risks for CEOs and Management Teams

cyber risk management

Cybersecurity has long been mistakenly viewed as an information technology problem that was only the concern of skilled IT staff. The reality is that cybersecurity should be considered as part of core business concerns, strategy, and planning. This should include the attention of top level management. CEOs should be very concerned about cybersecurity in their organizations. Never before have businesses had more to lose when it comes to a cybersecurity breach.

Read more

Google Team Drives Ransomware Protection 2018

Google Team Drives Ransomware Protection

Google Backup and Sync, along with Google Drive File Stream are the newest G Suite features that simplify the process of synchronizing files from computer to Google cloud. They quickly stream files from the hard drive and save time and storage for enterprise users. However, few people know that Drive File Stream comes with sufficient security risks to the most important teams’ files – Team Drives. 

Read more