Jason Costain

Jason Costain

Data Protection Specialist

Jason Costain is a security expert specializing in personal data protection. He offers rich insights into incident response planning, cloud security best practices, and the importance of multifactor authentication. With his highly applicable and easy-to-understand publications, Jason empowers his readers with the best methods to protect their sensitive data.

Security iDenfy Launches Innovative eIDV Solution to Streamline KYC Processes

iDenfy, a Lithuania-based Regulatory Technology (RegTech) company, has announced the launch of their new electronic identity verification (eIDV) solution. This system aims to revolutionize the Know Your Customer (KYC) processes across various industries, offering a blend of speed, security, and

iDenfy Launches Innovative eIDV Solution to Streamline KYC Processes
Security Securing Docker Remote API from Cyber Threats with Advanced Measures

Ensuring the safety and integrity of Docker environments has become more critical than ever as cybercriminals increasingly exploit vulnerabilities in Docker Remote API servers. This article delves into the sophisticated methods used by attackers and proposes advanced measures for safeguarding these

Securing Docker Remote API from Cyber Threats with Advanced Measures
Security Bitcoin Hashrate Surges to 769.8 EH/s, Industry Faces Profitability Concerns

The Bitcoin network recently witnessed an unprecedented increase in its hashrate, reaching a peak of 769.8 exahashes per second (EH/s) on October 21. This surge signifies a dramatic increase in the computational power deployed to secure the network. Since 2021, this trend has been evident and shows

Bitcoin Hashrate Surges to 769.8 EH/s, Industry Faces Profitability Concerns
Security How Did APT41 Execute a 9-Month Cyber Attack on the Gaming Industry?

The subject of this analysis is a sophisticated cyber attack attributed to the Chinese nation-state hacker group APT41, also known by several aliases such as Brass Typhoon, Earth Baku, Wicked Panda, or Winnti. Targeting the gambling and gaming industry, APT41 conducted a multi-stage attack over a

How Did APT41 Execute a 9-Month Cyber Attack on the Gaming Industry?
Security Critical Security Flaws Found in Cisco ATA 190 Series Adapters

Cisco has recently issued a critical security advisory alerting users to multiple vulnerabilities found in its ATA 190 Series Analog Telephone Adapters, which include the ATA 191 and ATA 192 models. These vulnerabilities pose significant risks to network security, as they can be exploited by remote

Critical Security Flaws Found in Cisco ATA 190 Series Adapters
Security Why Does NordVPN's New App for ARM-Based Windows Devices Matter?

NordVPN’s recent release of a native VPN application for ARM-based Windows devices marks a significant step in the evolution of cybersecurity technology. This is not merely another routine software update; it is a targeted innovation designed to keep pace with the rapid advancements in ARM a

Why Does NordVPN's New App for ARM-Based Windows Devices Matter?
Security RUSI's Securing Cyberspace Conference Tackles Global Cyber Challenges

In an era marked by rapid digital transformation, the inaugural Securing Cyberspace conference organized by the Royal United Services Institute (RUSI) emerged as a pivotal platform to address the burgeoning challenges of global cyber security. Bringing together a myriad of stakeholders from

RUSI's Securing Cyberspace Conference Tackles Global Cyber Challenges
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address