Normally when you report something like “2015 surpassed all of … ” that’s good news, but not in this case. Risk-Based Security reported that in 2015 the number of reported data breaches experienced that year surpassed all of the previous
Last Friday someone sent a phishing attack email to one of Snapchat’s payroll department employees impersonating their CEO Even Spiegel requesting for employee information. That employee complied and sent the attacker information on 700 current and former employees. One thing
I like the way Apple’s CEO, Tim Cook, recently described the situation of why Apple is choosing not to unlock the iPhone used by the San Bernardino terrorist Syed Farook — he called it the “software equivalent of cancer” in
So most of you have probably already seen the news about the US government asking Apple to making it’s iOS devices easier to hack into and Apple not complying. Apple posted this letter to customers a few days ago that
Last week I wrote about the Absolute Basics of Protecting Data for 2016. If protecting data isn’t your area of expertise, luckily it’s ours. Here’s a checklist of the minimum things you should ask your vendors in 2016 about how
Whether you choose our data protection products or someone else’s, here are the boiled-down-no-marketing-basic things that you need to know about protecting data in 2016: Which encryption technology is used: Data encryption is the process of scrambling data so that it is
A couple weeks ago, I posted an article about how you could hack into any *nix system just by using the backspace key. Looks like another major vulnerability just became public. Here’s an article about a Linux kernel flaw that
IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.