card__image

Who’s Who In Ransomware

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Ransomware is one of the most virulent and difficult security […]

card__image

Zero-Day Vulnerabilities: Cases about Consequences from 17 members of Forbes Technology Council

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Zero-day vulnerabilities are flaws or weaknesses in software or an […]

card__image

100% security — mission impossible?

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. At some point CIOs and CISOs have inevitably to provide […]

card__image

4 key mistakes CISO make at board meetings

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Presenting to the board is a challenging opportunity. CIOs and […]

card__image

Zero Trust Security: Benefits and Disadvantages

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. As threat actors become increasingly sophisticated, enterprises face a constant […]

card__image

Nearly two thirds of CISOs have had to deal with the loss of sensitive data in the past 12 months — Proofpoint report

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Cybersecurity company Proofpoint released its annual Voice of the CISO […]

card__image

Your password can be exposed in seconds

Disculpa, pero esta entrada está disponible sólo en Inglés y Ucraniano. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. When did you last update your passcodes? Cybersecurity experts say […]

card__image

Future and cybersecurity — interview with Vitaliy Yakushev

Disculpa, pero esta entrada está disponible sólo en Ucraniano. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Як відбувається все у кібернетичному просторі, як ламається людські долі через те, що ламається комп’ютер. Що таке для тебе майбутнє? Майбутнє […]