Editorial

Information Security Spending Is Growing. What Businesses Need to Know
Editorial Information Security Spending Is Growing. What Businesses Need to Know

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity market that includes: IT security, consumer sec

RaaS for loan for whomever is after your data
Editorial RaaS for loan for whomever is after your data

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those who had hacking abilities could (in theory) pose ser

Is online anonymity just a myth?
Editorial Is online anonymity just a myth?

Browsing anonymity may seem appealing for various reasons. Regardless of whether they have something worth hiding/protecting or not, those who know better appreciate the value of online privacy protection. But is VPN-supported anonymity all it is rumored to be, or not? A study coming from a joint

I spy with my digital eye… smartphone-induced risks
Editorial I spy with my digital eye… smartphone-induced risks

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave of smartphone c

Would you trust network security compartmentalization?
Editorial Would you trust network security compartmentalization?

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization. D

AI in cyber-security – or is it its mature counterpart, AGI?
Editorial AI in cyber-security – or is it its mature counterpart, AGI?

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like the peripheral nervous system, w

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later