Cyber Security

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Tom Eston | | border crossing, Canadian Perspective, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital id, Digital Privacy, Enhanced Driver's License, Episodes, Federal Government, Flying, Google Wallet, government surveillance, Identity Surveillance, Information Security, Infosec, Interstate Travel, law enforcement, National ID Cards, passport, Personal Stories, Podcast, Podcasts, Political Discussion, Post 9/11, Privacy, REAL ID, Right To Travel, security, Security Concerns, technology, tsa, US Travel, Voter ID, Weekly Edition
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and ...

Top AI-Driven Pentest Tools 2025
Artificial Intelligence, known to simplify complexities, is trending among organizations. Hence, AI being a buzzword is no more relevant in the context when looking at the near and far future of cybersecurity ...
HIPAA Security Updates for 2025: Elevating ePHI Protection
The U.S. Department of Health and Human Services (HHS) aims to address an evolving threat landscape—one shaped by tele-health expansion, increased cloud adoption, and the widespread use of APIs for data exchange ...

Web Application Firewall (WAF) Best Practices For Optimal Security
Web and mobile application code protection is a must-have security control. Modern solutions such as application layer firewall help your organisation to keep those assets protected from threats like SQL injection, cross-site ...

Securing Against Attacks: How WAF Rate Limiting Works
Rate limiting plays a major role in application security, especially when it is about defending web applications from malicious bot attacks, credential stuffing, brute force attacks and excessive API calls. Rate limiting ...

What is a Web Application Firewall (WAF)? Your Complete Guide
This is the ultimate guide to web application firewalls. You will get all your answers for questions like what a WAF is, why use a WAF and how it protects your digital ...

Multiple High-Risk Vulnerabilities in Microsoft Products
According to the latest advisory by Cert-In, 78 vulnerabilities have been discovered across a broad range of Microsoft products, including Windows, Azure, MS Office, Developer Tools, Microsoft Apps, System Center, Dynamics, and ...

Threat Detection and AI
In this blog series, we identified the challenges plaguing traditional security measures and introduced the modern three-pronged, AI-enhanced platform approach. In our second post, we examined the first pillar: threat prevention. We ...

Invasion of Privacy: The Hidden Camera Dilemma
Tom Eston | | Airbnb, Crime Junkies Podcast, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Detecting Cameras, Digital Privacy, Episodes, Hidden Cameras, Information Security, Infosec, law enforcement, Legal Implications, Podcast, Podcasts, Privacy, security, surveillance, technology, voyeurism, Voyeurism Laws, Weekly Edition
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical ...

From Swipe to Scare: Data Privacy and Cyber Security Concerns in Dating Apps
Dating apps changed everything; didn’t they? They’ve truly revolutionised how we discover love and make connections. Consider this: over 323 million people worldwide use them—millions swiping, matching, and meeting. But there’s a ...