Editorial

I spy with my digital eye… smartphone-induced risks
Editorial I spy with my digital eye… smartphone-induced risks

The idea that smartphone cameras may represent cybersecurity risks is not new. Smartphone-induced risks have plagued researchers from the beginning of this trendy devices’ rise. In time, specialists analyzed various scenarios. More recently, an official incident determined a new wave of smartphone

Would you trust network security compartmentalization?
Editorial Would you trust network security compartmentalization?

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization.

AI in cyber-security – or is it its mature counterpart, AGI?
Editorial AI in cyber-security – or is it its mature counterpart, AGI?

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like the peripheral nervous system,

Beyond Incident Response: Beating the Cyberattack Predictions  of 2017
Editorial Beyond Incident Response: Beating the Cyberattack Predictions of 2017

It would be a severe understatement to say the cyber-landscape has drastically shifted in the past several years. From mere nuisance to real threats on real lives, cyberattacks have grown to be a paramount the issue – and not just for the small-to-medium sized company, but for gigantic

KasperskyOS – how securing systems became a powerful OS
Editorial KasperskyOS – how securing systems became a powerful OS

Recently, Kaspersky officially launched their own Operating System, targeted at control systems, network devices and IoT-related operations. The product is the result of 14-years of hard work and, of course, puts cybersecurity in the spotlight. We should see amazing features in this completely new

Beware the traps of security automation
Editorial Beware the traps of security automation

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere. However, besides

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later