KineticFuse Blog

Insider Threats

The Russian cyberattack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t… Read the full article…

Continue Reading

Cybersecurity and Our Critical Infrastructure

The nation’s infrastructure is vulnerable to cyberattacks. We know this because a successful, prolonged (the attacks began as early as March 2016) cyberattack was discovered this year. In March 2018, the United States Department of Homeland Security (DHS) and the… Read the full article…

Continue Reading

National Cybersecurity Awareness Month

If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyberattacks should already be a paramount issue. However, if you have not been the victim of a hack or a… Read the full article…

Continue Reading

Phishing Explained: Don’t Get Hooked

If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know…. Read the full article…

Continue Reading

Advanced Persistent Threats – What Are They?

There are different levels of threat concerning cybersecurity. Sophisticated, prolonged attacks (usually carried out by a nation-state, organized criminal element, rival corporations with the intent of spying on your business, or terrorists) are referred to as Advanced Persistent Threats (APT)…. Read the full article…

Continue Reading

Malware, Ransomware, Virus… What’s the Difference?

Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration… Read the full article…

Continue Reading

Cybersecurity: One Word or Two?

Everyone knows the term “security” has evolved past the routine protection of the home or a person’s physical property. We’re also all aware that the word “cyber” is front and center in the realm of Information Technology. Information security is… Read the full article…

Continue Reading

Small Business, Big Target: Does My SMB Need Cybersecurity?

Small business owners are obviously aware of the threat of cyberattacks. You read about them in newspapers or hear about them on news reports. You know of the attacks on such big companies as Yahoo, eBay, Equifax, Target Stores, JP… Read the full article…

Continue Reading

Software Agents: A Partial Solution to Cybersecurity Threats

When we entered the world of cybersecurity a couple years ago, we considered software agents as a method of delivery for our solution. However, we quickly rejected this approach for a number of reasons and we believe it’s an unsuitable… Read the full article…

Continue Reading

Claims of AI in Cybersecurity Are Highly Exaggerated

Artificial intelligence is exciting and innovative technology. Cybersecurity is technology’s biggest problem, so it’s natural to apply the former to the latter. It’s also natural, then, that every cybersecurity company claims to use AI. However, most of those claims are… Read the full article…

Continue Reading
By Using the KineticFuse.com site you agree with our use of cookies. See our PRIVACY POLICY for more details. I Understand
Cybersecurity down for