Russell Fairweather

Russell Fairweather

Cybersecurity Consultant
Russell Fairweather is a versatile tech enthusiast whose expertise spans IT security, development, and networking. With a deep understanding of software development principles and networking protocols, Russell crafts content that offers invaluable insights and actionable advice. Trusted by professionals seeking to elevate their coding skills and reinforce network infrastructure, Russell is a resource for tech leaders navigating the ever-evolving shifts in technology.
Information Security Spending Is Growing. What Businesses Need to Know
Editorial Information Security Spending Is Growing. What Businesses Need to Know

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity market that includes: IT security, consumer sec

Would you trust network security compartmentalization?
Editorial Would you trust network security compartmentalization?

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization. D

Mass surveillance, the invisible cyber enemy lurking in the future
Editorial Mass surveillance, the invisible cyber enemy lurking in the future

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy number one in 2017. It managed to even

Machine to machine communication needs better security
Editorial Machine to machine communication needs better security

It is not hard to decode M2M technology, even for the less experienced of us. An abbreviation for machine to machine communication, M2M involves networked devices communicating among themselves. Without any manual assistance from humans, that is. M2M and IoT While IoT is all the tech online buzz

How they never listen to the experts (cyber sustainability)
Editorial How they never listen to the experts (cyber sustainability)

Sustainability in cyber-security may seem like a made up notion, but it isn’t. We stumbled upon it in CSO Online’s article on how DDoS Dyn attacks could have been prevented. When putting things into perspective, cyber sustainability makes a lot of sense. Especially in cyber-security. But let’s extra

Beveiligingscontrole – trying to elucidate a word
Editorial Beveiligingscontrole – trying to elucidate a word

As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged out of my account: Beveiligingscontrole.

Forget all cyber-security worries (by using strong awareness policies)
Editorial Forget all cyber-security worries (by using strong awareness policies)

What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational cyber-strategies when it com

Network events monitoring – enjoy an useful cyber-sentinel
Editorial Network events monitoring – enjoy an useful cyber-sentinel

In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar situations is the subsidiary defense move that completes any cyber-shield.

How to escape the BEC scam – when authority emails equal fraud
Editorial How to escape the BEC scam – when authority emails equal fraud

Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are a particular type of spear phishing, and four organizations

Smartphone fingerprint scanners – are they a trap?
Editorial Smartphone fingerprint scanners – are they a trap?

Fingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It took about

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later