Editorial

Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing
Editorial Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational practicality. But now, the world

Are We Still Using Firewalls In 2022?
Editorial Are We Still Using Firewalls In 2022?

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became somewhat saturated, developers re

Backup: An Essential Process in the New Global Business Environment
Editorial Backup: An Essential Process in the New Global Business Environment

The pandemic has forever changed the way we work, with many organizations resorting to remote working whether they liked it or not. Many businesses underestimated the risks associated with remote working and cloud solutions, with some managers believing they simply needed to train their employees

Cybersecurity: A Key Priority in the Current Geopolitical Context
Editorial Cybersecurity: A Key Priority in the Current Geopolitical Context

Governments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers
Editorial Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

With cyberattacks on the rise , it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within the organization’s network environment. But without

Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022
Editorial Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022

Cybercriminals are continuing to exploit the ongoing crisis in Ukraine. After initial report of increased malicious and scam activity , the Russian invasion in Ukraine led to the largest-ever spike in DDoS attacks. Compared to the first quarter of 2021, the number of DDoS attacks in the first

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later