Home
Insightful &
Helpful Articles

Here is what we're working on and
thinking at Hedgehog security.

How much will you pay to prevent a Breach?

How much will you pay to prevent a Breach?

For the owners of business with online servicing it is essential to set good security systems and protect their data from such harm. There are different ways to do that and all require certain steps towards the success of these measures.


5 Steps to Cyber Security

5 Steps to Cyber Security

Data safety is not easy thing to accomplish though, as the information is spread all around the web and can hardly be managed and monitored all the time.


3rd Party Security Vendors

3rd Party Security Vendors

With the development of the technologies and the flood of online servicing on the market the issues faced with the security of the data transfer and personal information have brought the need of special measures to be taken to provide protection from unauthorized access.


Cyber Security?

Cyber Security?

Today we live in modern world where technology advancement has provided us with countless opportunities for being hacked.


Security Bulletin for May 2016

Security Bulletin for May 2016

An exciting and scarey month with attacks that never happened, a bungled bank heist that only netted 81 million dollars and information about the FBI's attack on the iPhone becoming sinister.


Defend Yourself   Phishing

Defend Yourself Phishing

Welcome to the first in my "Defend Yourself" series. This month I am looking at the all too common Phish


The week in InfoSec

The week in InfoSec


Another mass password disclosure

Another mass password disclosure

6.6 million passwords in the clear are exposed.


Olympic Doping Hack

Olympic Doping Hack

The World Anti-Doping Agency (WADA) has reported that Russian hackers have leaked athletes? confidential medical records. The records include the results of all athletes? drug tests.


Interesting Scam

Interesting Scam

Every morning my first job of the day over a nice cup of coldbrew coffee is to go through the emails received over night. Occasionally I find a gem in the midst of the noise received from the internets. This morning I received something interesting to the security operations mailbox.