Top

Category: Featured


Featured

Passwords & Email Accounts: a Gateway for Hackers

October 25, 2017

Via: Sofia Allende

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point […]


Featured

Information Security Spending Is Growing. What Businesses Need to Know

September 10, 2017

Via: Jeremy Corkwell

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity […]


Featured, Malware

RaaS for loan for whomever is after your data

August 10, 2017

Via: Russel Edwards

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those […]


Featured, Privacy protection

Is online anonymity just a myth?

August 4, 2017

Via: Russel Edwards

Browsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or […]


Featured, Privacy protection

I spy with my digital eye… smartphone-induced risks

August 1, 2017

Via: Russel Edwards

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave […]


Featured, Network security

Would you trust network security compartmentalization?

July 26, 2017

Via: Russel Edwards

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a […]


Cyber warfare, Featured

AI in cyber-security – or is it its mature counterpart, AGI?

July 20, 2017

Via: Russel Edwards

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like […]


Featured

Combatting the Growing Threat of Ransomware

June 13, 2017

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


Featured, Network security

KasperskyOS – how securing systems became a powerful OS

March 1, 2017

Via: Russel Edwards

Recently, Kaspersky officially launched their own Operating System, targeted at control systems, network devices and IoT-related operations. The product is the result of 14-years of hard work and, of course, puts cybersecurity in the spotlight. We should see amazing features […]


Featured, Vulnerabilities

Beware the traps of security automation

February 1, 2017

Via: Russel Edwards

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. […]