card__image

Industries most vulnerable to cyberattacks in 2020

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Несмотря на то, что практически любой бизнес или частное лицо может стать жертвой кибератак, некоторые отрасли оказываются фаворитами киберпреступников. Тревожная статистика финансовых […]

card__image

Cybersecurity: Why Technoligy Is Failing?

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Технологии кибербезопасности не так эффективны, как должны быть, когда речь заходит о защите организаций от киберугроз. Такого мнения придерживаются 90% участников исследования […]

card__image

Top 5 Tech Trends 2020

Gartner: 5 most significant technology trends What technologies will significantly affect business, society, and people over the next 5-10 years? According to Gartner VP of research Brian Burke, it includes technologies that enable a composable enterprise, aspires to regain society’s trust in technology, and alter the state of your brain. In the latest research Hype […]

card__image

DarkNet Service Price Index 2020

DarkNet – a hidden network where connections are made only between trusted peers, sometimes called friends, using non-standard protocols and ports. An anonymous network is a system of unbound virtual tunnels that provide encrypted data transmission.   Darknet has earned a reputation as a sinister abyss, an “underground” associated with criminal activity. And there are […]

card__image

Global Cybersecurity Exposure Index 2020

New Cybersecurity Exposure Index (CEI) – Ukraine among the most exposed to cyber threats As the world faces the new post-COVID 19 reality, the countries’ becoming more and more aware of ensuring the security of their digital infrastructures. Cybercrime can take many forms: – from endpoint cyberattacks aimed at gaining unauthorized access, stealing data and […]