card__image

Auto Draft

Leider ist der Eintrag nur auf en, ru und ua verfügbar. Microsoft recently released its Digital Defense Report 2022, representing the current threat landscape, mentioning the first russian-Ukrainian „hybrid war“, reviewing the current state of cybercrime, and identifying the characteristics to successfully defend against future threats.   Nation-state groups are becoming a more dangerous threat […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en, ru und ua verfügbar. The most effective software, application, or product results from a highly process-oriented Quality Assurance (QA) function in the Software Development Life Cycle (SDLC). However, it is sometimes seen as an add-on that comes at the end to check on all aspects of the product […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en und ua verfügbar. Security efforts in both public and private organizations focus on protecting their infrastructure from internal and external adversaries. These organizations spend billions each year on technology defenses. This approach was considered sufficient before the global social media explosion. 4.62 billion people globally use social media. […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en und ua verfügbar. Harvard’s Belfer Center for Science and International Affairs released its updated 2022 National Cyber Power Index (NCPI), a follow-up to its 2020 index that ranks 30 countries according to their capability and intent to pursue eight objectives of cyber power.   “States continue to expand […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en und ua verfügbar. Most organizations have many questions about cyber attacks: What is a cyber attack? How do I know when I’m being attacked? Am I even at the risk of a cyber attack?   One of the best ways to protect your network from a cyber attack […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en und ua verfügbar. You’ve probably heard about honeypots — tools that act as baits, luring attackers into revealing themselves by presenting a seemingly tempting target. In recent years, honeypots have evolved into Deception technology.   Deception is a very accurate characterization of the solution — after all, to […]

card__image

Auto Draft

Leider ist der Eintrag nur auf en, ru und ua verfügbar. „The skills gap isn’t just a talent shortage challenge, but it’s also severely impacting business, making it a top concern for executive leaders worldwide,” said Sandra Wheatley, SVP Marketing, Threat Intelligence and Influencer Communications at Fortinet.   Cybersecurity skills gap and shortage of talent […]