Sebastian Raiffen

Sebastian Raiffen

IT Security Consultant
Sebastian Raiffen is an IT expert specializing in security development. He explores the latest in cybersecurity and offers practical tools and strategies for enhancing digital defense. His signature writing style incorporates meticulous research and analysis, producing technical content that ranges from dissecting malware to deciphering encryption algorithms. Sebastian is sought after for his in-depth security commentary and expert advice.
Dark Web Monitoring: Being One Step Ahead of Cybercriminals
Editorial Dark Web Monitoring: Being One Step Ahead of Cybercriminals

The emergence of new threats has forced security experts to implement bulletproof practices and to make more efforts to understand how cybercriminals work. One key aspect of this process is to know what hackers do with stolen data. In recent years, more and more reports show that compromised

Cyber Attacks & Remote Working—How Are They Related?
Editorial Cyber Attacks & Remote Working—How Are They Related?

In the digital era, cybersecurity is very often an asset that separates mediocre businesses from extraordinary ones. And with the average cost of a data breach being around $3.86 million , it seems to also make the difference between low and high revenue.  However, 2020 has brought difficult

5 Ways To Hire and Retain More Women in Cybersecurity
Editorial 5 Ways To Hire and Retain More Women in Cybersecurity

“I would say to women starting out in cyber to stop asking permission, and stop waiting for opportunities. If you want to transition internally ask how your employer can help you, not if they will permit you.” Eliza May Austin, Ladies of London Hacking Society   It’s not a surprise that men still ou

VPN Best Practices for Supporting Your Teleworkers
Editorial VPN Best Practices for Supporting Your Teleworkers

The COVID-19 pandemic shook the business world to the core since restrictions and mandatory public health measures forced employees to work from home. As lockdowns ended, more and more businesses started to rethink in-office perks and extend their work-from-home arrangements. As a result, tech

The Rise of Encryption: Encrypted Messengers in a Surveilled World
Editorial The Rise of Encryption: Encrypted Messengers in a Surveilled World

Regardless of the political side of the situation, the curious case of Edward Snowden has proven one thing: when uncovered, government spying enables a giant push to data scrambling on the Web. Giants like Yahoo, Google, and Microsoft have substantially implemented encrypted data over the last 15

How to Choose the Right Unified Endpoint Management Solution
Editorial How to Choose the Right Unified Endpoint Management Solution

Today, many businesses use a large number of connected devices, ranging from desktop computers to barcode scanners. As IT and security leaders work around the clock to secure and maintain servers, computers, smartphones, tablets, iPads, IoT devices, virtual machines, and more, choosing the right

The Digital Cold War: What to Expect in 2020
Editorial The Digital Cold War: What to Expect in 2020

Is your business prepared to face the new cyber cold war threat? This is becoming an increasingly pressing concern for many European and US businesses, as the reality of a digital cold war between the west and the east becomes clearer and clearer each day. For many, what lies ahead is a big

5G Security Concerns for 2020 and Beyond
Editorial 5G Security Concerns for 2020 and Beyond

A new decade fresh with opportunity is upon us, along with new opportunities for cybercriminals to prove their skills.  Cybersecurity threats have become increasingly ingenious over the last couple of years. To think that it all started out as “phone phreaking” in the late 1960s and early 1970

The New Cold Boot Attack Leaves Most Systems Vulnerable
Editorial The New Cold Boot Attack Leaves Most Systems Vulnerable

Security researchers have recently found that almost “all modern computers” are vulnerable to a modified version of the old cold boot attacks.  This new version, discovered by a Finnish company last year, can interfere with a machine’s firmware in order to disable all security measures and allow an

Ethical Hacking: A Critical Cog in the Future of Cybersecurity
Editorial Ethical Hacking: A Critical Cog in the Future of Cybersecurity

Every headline-grabbing cyberattack unveils new sophisticated hacking techniques, but the attacker’s portrait remains the same: a modern-day professional with a strong sense of curiosity, patience, and social skills that thoroughly examines a company’s systems, takes note of every vulnerability, the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later