Demos
How To Use Demos

How to use demos

Learn more about usage and features with our collection of demonstrations.

Tag Archives: hackers

image of dark reading logo

Infographic: The Many Faces of Today’s Hackers

Almost every day, we hear about a new security breach, but who’s behind these attacks? Whether you’re dealing with the “professional mercenary,” the “cyber warrior” or the “malicious insider,” cyberhackers come in many shapes and sizes. See the infographic below depicting the many faces of today’s hackers, from general types of hackers that enterprises often face to the types of attacks they’re most likely to deploy. Click on the image to magnify and download.

black market hacker personas

Click here to read the full story and download the infographic from darkreading.com.

Cyber Privacy: Notice-and-Consent vs. Responsible Use

With the rise of hacker incidents, cyber security and privacy has become a hotbed issue. The prevalent Internet privacy framework of today is the “notice-and-consent framework,” or what you do every time you click on an “accept” button. You have been notified and given consent.

This framework, however, allows data aggregators and brokers to take your data and pretty much do whatever they please and many consider this insufficient to protect individual’s privacy.

The idea of “responsible use” on the other hand, puts the responsibility on the “entities that collect, maintain and use data.” This means that data collectors and users are accountable for how they manage data and any harm it causes.

Imagine the positive publicity organizations that endorse responsible use would generate.

And you’ll probably think twice before you hit that “accept” button.

 

“"
Thank you for visiting our site, due to the size of your mobile device, you need to rotate it 90° to view this site.