Editorial

AI in cyber-security – or is it its mature counterpart, AGI?
Editorial AI in cyber-security – or is it its mature counterpart, AGI?

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like the peripheral nervous system,

Beyond Incident Response: Beating the Cyberattack Predictions  of 2017
Editorial Beyond Incident Response: Beating the Cyberattack Predictions of 2017

It would be a severe understatement to say the cyber-landscape has drastically shifted in the past several years. From mere nuisance to real threats on real lives, cyberattacks have grown to be a paramount the issue – and not just for the small-to-medium sized company, but for gigantic

KasperskyOS – how securing systems became a powerful OS
Editorial KasperskyOS – how securing systems became a powerful OS

Recently, Kaspersky officially launched their own Operating System, targeted at control systems, network devices and IoT-related operations. The product is the result of 14-years of hard work and, of course, puts cybersecurity in the spotlight. We should see amazing features in this completely new

Beware the traps of security automation
Editorial Beware the traps of security automation

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. However, besides

Broken cyber identity – can damages be repaired?
Editorial Broken cyber identity – can damages be repaired?

What happens to the victims of data theft, once hackers get hold of their identity? We were tempted to say “digital identity”, but that would not have been complete. Once the personally identifiable information (PII) or sensitive personal information (SPI) is in the hands of malicious entities, it

Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)
Editorial Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)

Unfortunately, often in the digital environment what makes things faster and easier is riddled with cyber security risks. This time, it is about the autofill feature. Finish specialist Viljami Kuosmanen illustrated how easy it is for third parties to get private user data via autofill storage. The

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later