Megan Clairmont

Megan Clairmont

IT Security Expert
Megan Clairmont is an Information Technology expert with deep knowledge of IT security, development, and networking. With expertise in the IT industry, Megan produces content that offers practical guidance and in-depth analysis, helping her audience stay informed about the latest trends in tech. Her contributions to leading industry publications are highly regarded for their clarity, accuracy, and relevance.
Zero Trust Networks – A Cybersecurity Trend to Prepare For in 2020
Editorial Zero Trust Networks – A Cybersecurity Trend to Prepare For in 2020

As cybersecurity attacks accelerate and tactics become more complex, modern organizations need a new security model that protects people, devices, apps, and data wherever they are located. In the following years, the traditional VPN will be replaced by Zero Trust, a smarter, safer approach to

Top 5G Security Challenges
Editorial Top 5G Security Challenges

In the past decades, the telecommunications industry has seen massive changes. We’ve gone from first mobile phone to 4G LTE, and we’re now getting ready to enter a new era of intelligent connectivity, the era of 5G networks. What is 5G, exactly? 5G represents the next generation of broadband con

Mobile Security Threats You’ll Probably Face in 2019
Editorial Mobile Security Threats You’ll Probably Face in 2019

Hundreds of millions of people use a smartphone daily, if not hourly . It’s amazing how this small device contains all your most personal information: passwords, contacts, messages. Even companies heavily rely on them to keep in touch with both their employees and customers. But, at the same time, f

Hackers move to the Cloud – new security challenges for modern organizations
Editorial Hackers move to the Cloud – new security challenges for modern organizations

As more and more data and applications are moving to the cloud, organizations now face a host of new security threats and challenges. Today, cloud infrastructures appear to be the growing target among threat actors. In the last six months, cryptomining attacks have become the leading attack vector

RaaS for loan for whomever is after your data
Editorial RaaS for loan for whomever is after your data

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those who had hacking abilities could (in theory) pose ser

KasperskyOS – how securing systems became a powerful OS
Editorial KasperskyOS – how securing systems became a powerful OS

Recently, Kaspersky officially launched their own Operating System, targeted at control systems, network devices and IoT-related operations. The product is the result of 14-years of hard work and, of course, puts cybersecurity in the spotlight. We should see amazing features in this completely new

Data Brokers and why is privacy protection valuable
Editorial Data Brokers and why is privacy protection valuable

During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy rights and their importance in the online

How does digital security differ from cyber-security?
Editorial How does digital security differ from cyber-security?

Slowly, but firmly, digital security replaces cyber-security. Some may experience surprise or confusion. More articles, more companies’ resources and presentations use the new term instead of the traditional one. What is going on? How does digital security differ from cyber-security? Most i

Cyber Defence 2017 – what to expect?
Editorial Cyber Defence 2017 – what to expect?

The next year is not so far now. Cyber Defence 2017 is shaping up. By this we mean all cyber-security lines of defence, research-level and company-level. What will the trends be and how will they unfold? Although surprises are not excluded (see the recent Dyn attack), some have started to release

What do you know on fuzz testing?
Editorial What do you know on fuzz testing?

Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and that is just one of the effects. Damaged reputation also

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later