card__image

WEF: state of cybersecurity 2022

WEF: state of cybersecurity 2022 Let’s see what progress cybersecurity has made over the year:   The COVID-19 pandemic has pushed on the use of digital tools in business and the home. These advances in digitalization have led to increasingly frequent, costly and damaging cyber incidents. The World Economic Forum’s Global Cybersecurity Outlook 2022 presents critical findings […]

card__image

2022: Top 10 Cyber Risks for Business

A growing number of cybersecurity threats make companies toy7gguh be on the lookout. More sophisticated cyberattacks have been aimed at the data and assets of corporations, governments, school systems, utilities, and financial institutions. As our reliance on technology increases and a new remote workforce emerges, so the volume of cybercrimes is growing.   With increasing […]

card__image

Cybersecurity Trends 2022

The cybersecurity industry experienced an utter chaos over 2021: the highest ever numbers of ransomware attacks, SolarWinds’ supply-chain havoc and endless breaches. All of it would have sounded too wild for real life a short year ago.   What, then, lies ahead? Threatpost talked to industry experts and developed this list of the five top […]

card__image

Disclosure: What Passwords Say About the People Who Choose Them

Sorry, this entry is only available in Russian and Ukrainian. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. О паролях сказано и известно многое. Большинство из них короткие, простые, […]

card__image

Fingerprint cloning: Is it real?

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. ТЕЛЕФОННЫЕ И КОМПЬЮТЕРНЫЕ СКАНЕРЫ ОТПЕЧАТКОВ ПАЛЬЦЕВ МОЖНО ПОБЕДИТЬ С ПОМОЩЬЮ ТРЕХМЕРНОЙ ПЕЧАТИ   Введение Пароли — это традиционные методы аутентификации для компьютеров […]

card__image

InfoSec And Cybersecurity – What’s The Difference?

Information security and cybersecurity share the same goals of protecting people, data, and devices. The difference between the two areas is the approach and scope of protection.   Information security (InfoSec)   Information security refers to protecting data from accidental or intentional interference. The methods are grouped into technical, administrative, legal, and physical.   Technical […]