Category: Featured


The Makings of a Great Incident Management Process

December 8, 2017

Via: Michael Boyd

The importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important?   Simply because no one is exempt from […]


5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target

November 24, 2017

Via: Sofia Allende

Are cyber-threats keeping you up at night? You are not alone, dear reader. As hackers have become more skilled, there has been a rise in the number, severity and sophistication of cyber-attacks inflicting organizations of all sizes, all around the […]


Passwords & Email Accounts: a Gateway for Hackers

October 25, 2017

Via: Sofia Allende

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point […]


Information Security Spending Is Growing. What Businesses Need to Know

September 10, 2017

Via: Jeremy Corkwell

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity […]

Featured, Malware

RaaS for loan for whomever is after your data

August 10, 2017

Via: Russel Edwards

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those […]

Featured, Privacy protection

Is online anonymity just a myth?

August 4, 2017

Via: Russel Edwards

Browsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or […]

Featured, Privacy protection

I spy with my digital eye… smartphone-induced risks

August 1, 2017

Via: Russel Edwards

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave […]

Featured, Network security

Would you trust network security compartmentalization?

July 26, 2017

Via: Russel Edwards

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a […]

Cyber warfare, Featured

AI in cyber-security – or is it its mature counterpart, AGI?

July 20, 2017

Via: Russel Edwards

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like […]


Combatting the Growing Threat of Ransomware

June 13, 2017

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]