ThreatWarrior Blog

Malware, Ransomware, Virus… What’s the Difference?

Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration… Read the full article…

Continue Reading

Cybersecurity: One Word or Two?

Everyone knows the term “security” has evolved past the routine protection of the home or a person’s physical property. We’re also all aware that the word “cyber” is front and center in the realm of Information Technology. Information security is… Read the full article…

Continue Reading

Software Agents: A Partial Solution to Cybersecurity Threats

When we entered the world of cybersecurity a couple of years ago, we considered software agents as a method of delivery for our solution. However, we quickly rejected this approach for a number of reasons and we believe it’s an… Read the full article…

Continue Reading

Claims of AI in Cybersecurity Are Highly Exaggerated

Artificial intelligence is an exciting and innovative technology. Cybersecurity is technology’s biggest problem, so it’s natural to apply the former to the latter. It’s also natural, then, that every cybersecurity company claims to use AI. However, most of those claims… Read the full article…

Continue Reading

Threats are Evolving, Your Cybersecurity Should Too

With today’s rapid technological advances, cybercriminals’ tactics are growing more sophisticated and the threats are rising in complexity. Cyber agents are breaching firewalls and committing espionage with an increasing ability to avoid detection. It seems that each year outdoes the… Read the full article…

Continue Reading

Hackers Exploiting an Open Door Policy at Equifax

It’s currently unknown how long hackers were in Equifax’s systems before they were detected, or if the ones discovered were the only ones that took advantage of Equifax’s open door policy. What we do know is that they (and potentially… Read the full article…

Continue Reading

What the Hack is Going on with Equifax?

On the cyber frontier, more than 143 million Americans were just hit by a digital disaster, this one in the form of a successful hack against Equifax. Equifax is one of three credit reporting agencies, Experian and TransUnion being the others…. Read the full article…

Continue Reading

Unsupervised Neural Networks: What are they?

We’ve all heard the buzzwords – artificial intelligence, machine learning, supervised and unsupervised neural networks, etc. – flying around the tech industry. In the world of IT, there’s never a shortage of these buzzwords, but they’re oftentimes used incorrectly and… Read the full article…

Continue Reading

The State of Cybersecurity

We’ve had tremendous feedback since we announced ThreatWarrior™, and we appreciate all the kind emails and comments that have poured in. In a previous blog post, I mentioned that with the creation of ThreatWarrior™, ThreatWarrior felt compelled to assist in… Read the full article…

Continue Reading

Future of Cybersecurity: ThreatWarrior

Posted on by

Like many others (and probably most of you reading this), over the last year, we’ve observed a significant increase in the number of cyber attacks and a growing diversity in cyber threat type. What’s more, cyber attacks don’t discriminate –… Read the full article…

Continue Reading
By Using the ThreatWarrior.com site you agree with our use of cookies. See our PRIVACY POLICY for more details. I Understand
Cybersecurity down for