Editorial

The Secure USB Stick—The Little Wizard of Strong Security Practices
Editorial The Secure USB Stick—The Little Wizard of Strong Security Practices

Nowadays, implementing strong security practices is more important than ever because offices are no longer stable physical locations, while the diversity of access points in organizations’ ecosystems are constantly growing. Managers are facing these challenges for the first time, and they are l

Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics
Editorial Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics

Organizations view information as a strategic resource, and the importance of integrating applications and IT systems are becoming increasingly important. So, in recent years—as a result of accelerated digitization—the list of risks and types of cyberattacks has grown. Furthermore, emails con

Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing
Editorial Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational practicality. But now, the world

Are We Still Using Firewalls In 2022?
Editorial Are We Still Using Firewalls In 2022?

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became somewhat saturated, developers re

Backup: An Essential Process in the New Global Business Environment
Editorial Backup: An Essential Process in the New Global Business Environment

The pandemic has forever changed the way we work, with many organizations resorting to remote working whether they liked it or not. Many businesses underestimated the risks associated with remote working and cloud solutions, with some managers believing they simply needed to train their employees

Cybersecurity: A Key Priority in the Current Geopolitical Context
Editorial Cybersecurity: A Key Priority in the Current Geopolitical Context

Governments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later