Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Understanding Risk-Based Authentication: Main Benefits and Drawbacks
Editorial Understanding Risk-Based Authentication: Main Benefits and Drawbacks

Now more than ever, companies have digital assets to protect and more users who need to access them from different places. Credential-based threats make it difficult to secure these valuable resources while making them easily accessible to those who legitimately need them. To achieve and maintain

Cybersecurity Tips For Small Businesses In A Post-Pandemic World
Editorial Cybersecurity Tips For Small Businesses In A Post-Pandemic World

The year 2021 has been shaped by an economic recovery from the coronavirus pandemic, as people and businesses have modified and adjusted their personal and professional lives to meet new and diverse challenges. As businesses focused on aligning with the new changes, the same can be said for

Cybersecurity Challenges in an IoT World
Editorial Cybersecurity Challenges in an IoT World

The paradigm shift to the Internet of Things (IoT) and the emergence of edge computing have brought in huge potential for various IoT application scenes. While IoT is creating entirely new businesses and revenue streams, it has also created new opportunities for vital information to be compromised.

WhatsApp and iMessage Give Large Amounts of User Data to the FBI: Leaked Document
Editorial WhatsApp and iMessage Give Large Amounts of User Data to the FBI: Leaked Document

Almost all instant messaging services on the market today make a big deal about their security and privacy policies. A recently leaked document has revealed just how much data the FBI can legally obtain from these services. The infographic shows details about iMessage, Line, Signal, Telegram,

Protecting Critical Infrastructure in the Age of Ransomware
Editorial Protecting Critical Infrastructure in the Age of Ransomware

The recent increase in ransomware attacks has highlighted vulnerabilities in critical infrastructure and the ease of affecting component systems. As the paradigm shifts, important preemptive measures must be taken.  A New Generation of Critical Infrastructure A decade ago, critical infrastructure

Thinking Like a Hacker (Ethically)—the Why and How
Editorial Thinking Like a Hacker (Ethically)—the Why and How

Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright. A

Protecting Your Expanding Attack Surface
Editorial Protecting Your Expanding Attack Surface

As much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were and still are also at

Cybercrime in 2021-Top 5 Cyber Attacks Witnessed so Far
Editorial Cybercrime in 2021-Top 5 Cyber Attacks Witnessed so Far

With cybercrime on the rise, thousands of cyber attacks and data breaches are recorded each day. The phenomenon is surely not showing any signs of slowing down, with several big cyber attacks making the headlines so far this year. In 2021, the number of attacks increased day after day, rising to no

Top 5 cyber risks of online learning in 2021
Editorial Top 5 cyber risks of online learning in 2021

“The shift to remote learning opens the door for different points of attack that most school districts weren’t set up to support” – Amy McLaughlin It was not so long ago that online education became the new norm. Schools and universities from all around the world closed their doors to learners and t

5 steps to manage the cyber risks of today’s remote work
Editorial 5 steps to manage the cyber risks of today’s remote work

Asking employees to work remotely is no longer news for organizations and governments, in order to protect people’s health. Today, there are more than 300 million people expected to work remotely , according to the US Bureau of Labor Statistics and Boston Consulting Group estimates. This brings u

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later