card__image

Zero Trust Security: Benefits and Disadvantages

As threat actors become increasingly sophisticated, enterprises face a constant battle to keep their security policies and controls on pace with the evolution of threats. The attack surface continues to widen as the technology landscape becomes more complex, increasing the opportunities for hackers to cause widespread devastation.   The zero trust model has emerged as […]

card__image

Nearly two thirds of CISOs have had to deal with the loss of sensitive data in the past 12 months — Proofpoint report

Cybersecurity company Proofpoint released its annual Voice of the CISO report, which explores key challenges, expectations, and priorities of chief information security officers (CISOs).   CISOs AGREE THAT THEIR ORGANIZATION IS AT RISK OF A MATERIAL CYBER ATTACK IN THE NEXT 12 MONTHS   According to a new survey of 1,600 CISOs from around the […]

card__image

Future and cybersecurity — interview with Vitaliy Yakushev

Sorry, this entry is only available in Ukrainian. Як відбувається все у кібернетичному просторі, як ламається людські долі через те, що ламається комп’ютер. Що таке для тебе майбутнє? Майбутнє – це кожна секунда, яка буде після цієї секунди, тобто все, що буде через секунду, хвилину, рік. Можливо, дуже сподіваємося 10 років, якщо ми не загинемо […]