Monthly Archives: August 2022

Ubiquitous Surveillance by ICE

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE).Our two-year investigation, including hundreds of Freedom of Information Act requests and a comprehensive review of ICE’s contracting and procurement records, reveals that ICE now operates as a domestic surveillance…
Read more

The Business of Hackers-for-Hire Threat Actors

Today's web has made hackers' tasks remarkably easy. For the most part, hackers don't even have to hide in the dark recesses of the web to take advantage of people any longer; they can be found right in plain sight on social media sites or forums, professionally advertised with their websites, and may even approach…
Read more

Best encryption software 2022

Encryption software protects confidential and private data in transit and at rest by making it accessible only to authorized individuals. Learn about the best encryption software and techniques.ContentsWhat are file encryption techniques?What is encryption software?Best encryption softwareHow to pick the encryption software that’s right for youEncryption is the process of securing information by translating it…
Read more

Best penetration testing tools: 2022 buyer’s guide

Security professionals need penetration testing tools to understand the security posture of every software environment. Check out our list of the best penetration testing tools in 2022.Knowing the state of the entire software system is of the utmost importance if business organizations are to operate with zero tolerance for security vulnerabilities. Although it may be…
Read more

Almost 2,000 data breaches reported for the first half of 2022

Though the number of breaches reported in the first half of 2022 were lower than those for the same period in 2021, Flashpoint expects the final numbers to be similar.A successful data breach can impact an organization not just by compromising sensitive information but by serving as a prelude to ransomware and more devastating cyberattacks.…
Read more