card__image

Types of Personal Data

The explosive growth in the quantity and quality of personal data in the last decade has stimulated new opportunities in economic and social fields. But there are two sides to every story. The irresponsible approach to the collection, processing, storage, and distribution of personal information has led to many leaks and, consequently, to its illegal […]

card__image

Industries most vulnerable to cyberattacks in 2020

Any business or individual can fall victim to cyberattacks, but some industries become more popular among cybercriminals than others. Reports on financial losses caused by data breaches show that many companies lack a strategy to manage these risks.   Which industries are most vulnerable to cyber attacks   According to HelpNet Security  4.1 billion accounts […]

card__image

Top 5 Tech Trends 2020

Gartner: 5 most significant technology trends What technologies will significantly affect business, society, and people over the next 5-10 years? According to Gartner VP of research Brian Burke, it includes technologies that enable a composable enterprise, aspires to regain society’s trust in technology, and alter the state of your brain. In the latest research Hype […]

card__image

DarkNet Service Price Index 2020

DarkNet – a hidden network where connections are made only between trusted peers, sometimes called friends, using non-standard protocols and ports. An anonymous network is a system of unbound virtual tunnels that provide encrypted data transmission.   Darknet has earned a reputation as a sinister abyss, an “underground” associated with criminal activity. And there are […]

card__image

Global Cybersecurity Exposure Index 2020

New Cybersecurity Exposure Index (CEI) – Ukraine among the most exposed to cyber threats As the world faces the new post-COVID 19 reality, the countries’ becoming more and more aware of ensuring the security of their digital infrastructures. Cybercrime can take many forms: – from endpoint cyberattacks aimed at gaining unauthorized access, stealing data and […]