
Structured Thinking to Combat Cyber Criminals
Introduction Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discovering that a traditional security approach w…
Tags:Cyber SecurityDLPEndpoint
Introduction Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discovering that a traditional security approach w…
Tags:Cloud ComputingCyber SecurityCyber Security Training
Work environments now a days are more dynamic than ever before, which makes it hard for those who are still using the traditional tools. Cloud environments are increasingly popular as it offers great …
Tags:Cloud Computingcoffee minercyber attacks
"Free Wi-Fi” – the notice declares. Weary shoppers throng into the coffee shop, drawn by the prospects of Internet access at no cost whilst, perhaps, enjoying a warm cuppa with some cake. Public Wi-Fi…
Tags:AIArtificial IntelligenceBitdefender
“I’m a Data Scientist”. Fundamental to the field of Artificial Intelligence, Data Scientists are skilled at developing or exploiting mathematical tools to examine troves of data and extract meaningful…
Tags:20182019 predictionscyber attacks
As the year draws to a close, it is worthwhile for Cyber Security professionals to reflect upon their individual experiences in light of the global landscape. The Cyber Security world was highly activ…
Tags:cyber attackcyber attackscyber insurance
Cyber insurance is a product used to protect businesses and individual users from cyber risks. It was designed to help an organization mitigate risk of exposure by offsetting costs required during rec…
Tags:cyber attackscyber resilienceCyber Security
What is cyber resilience? Resilience is the ability to recover from or adjust easily to misfortune or change. With the rapid growth of technology, enterprises are collecting, using and analyzing more…
Tags:2018cyber attacksCyber Security
What is IoT? The Internet of Things (IoT) is a vast, connected network of homogeneous components called “Things”. These Things are basically embedded devices, each of a different nature. Driving t…
Tags:2018Artificial Intelligencecyber attack
Aaron Higbee, Co-founder and CTO, Cofense, discusses the future of phishing defense and asks which side of the fence the future of defense against phishing attacks lies: human or machine? Most modern…
Tags:auditblack box penetration testingcloud
Most organizations do not consider the importance of their security system until it has already been breached. In some cases, security breaches occur because an employee did not adhere to the company …