BLOG


Cyber Security Data Protection Business Technology Privacy concept.

How Secure is the Mainframe in 2020?

The mainframe remains the most intrinsically secure platform on the planet for several additional reasons. First, all of the hardware and software that’s needed to complete mainframe transactions resides on a single machine, unlike a distributed environment where there is much network traffic that can be intercepted by an attacker. Second, mainframes’ front-end processors often handle the task of interfacing with the rest of the...

Read More


Stay on top of cyber security while children school at home

Stay on top of cyber security while children school at home

While grown-ups are stuck at home conducting business remotely on a computer, so likewise are kids working remotely on school assignments using a home computer. With the tremendous amount of people doing work and school on home PCs, I’m appalled at the lack of cyber security training happening. We see plenty of stories about students learning at home, but we don’t read much about hacker’s...

Read More


Is artificial intelligence invading privacy rights?

Is artificial intelligence invading privacy rights?

One of the hottest debate topics in today’s COVID-19 world is the proper balance of public safety with personal privacy. The latest actor to take center stage in that discussion is “Artificial Intelligence”. With so much of the world still in quarantine, including law enforcement personnel, governments are turning to technology to help fill in the “enforcement” gaps. In the United States, Senator Edward Markey...

Read More


HOW CAN A CYBER SECURITY SERVICE HELP SECURE YOUR ORGANIZATION

HOW CAN A CYBER SECURITY SERVICE HELP SECURE YOUR ORGANIZATION

Vulnerabilities Are On The Rise: Secure Your Business Now The reliance of businesses on data and information transmitted via cyberspace was never so high. While the data explosion has made organizations more effective and profitable, it has presented them with new security risks and challenges. Just as protecting your home against trespassers is important, securing your business data and information is equally critical to the...

Read More


10 Best Practices for Cyber Security in 2017

10 Best Practices for Cyber Security in 2017

Most security professionals agree, it is not a matter of if you get breached it’s a matter of when. Security teams have been battling a landscape of constantly evolving external attacks for years; now security team are also accountable for addressing the risk of insider breaches as well. The truth is, the majority of organizations in 2017 will face some sort of breach whether it...

Read More


Woman in a cafe having problems with the credit card  ++++NOTE for the inspector: Credit card is fake and is made especially for the photosession ++++

Protecting Your Organization From Phishing Schemes

It’s not just the bad actors that we at Core Security want to protect you from – we also want to protect you from yourself. It’s all hands on deck when it comes to securing your systems and the systems you interact with on a daily basis. Everyone personally has, on average, four devices to keep track of – all with different accounts (or even...

Read More



Page 1 of 212