card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais, Russe et Ukrainien. Microsoft recently released its Digital Defense Report 2022, representing the current threat landscape, mentioning the first russian-Ukrainian « hybrid war », reviewing the current state of cybercrime, and identifying the characteristics to successfully defend against future threats.   Nation-state groups are becoming a more dangerous threat […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais, Russe et Ukrainien. The most effective software, application, or product results from a highly process-oriented Quality Assurance (QA) function in the Software Development Life Cycle (SDLC). However, it is sometimes seen as an add-on that comes at the end to check on all aspects of the product […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais et Ukrainien. Security efforts in both public and private organizations focus on protecting their infrastructure from internal and external adversaries. These organizations spend billions each year on technology defenses. This approach was considered sufficient before the global social media explosion. 4.62 billion people globally use social media. […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais et Ukrainien. Harvard’s Belfer Center for Science and International Affairs released its updated 2022 National Cyber Power Index (NCPI), a follow-up to its 2020 index that ranks 30 countries according to their capability and intent to pursue eight objectives of cyber power.   “States continue to expand […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais et Ukrainien. Most organizations have many questions about cyber attacks: What is a cyber attack? How do I know when I’m being attacked? Am I even at the risk of a cyber attack?   One of the best ways to protect your network from a cyber attack […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais et Ukrainien. You’ve probably heard about honeypots — tools that act as baits, luring attackers into revealing themselves by presenting a seemingly tempting target. In recent years, honeypots have evolved into Deception technology.   Deception is a very accurate characterization of the solution — after all, to […]

card__image

Auto Draft

Désolé, cet article est seulement disponible en Anglais, Russe et Ukrainien. « The skills gap isn’t just a talent shortage challenge, but it’s also severely impacting business, making it a top concern for executive leaders worldwide,” said Sandra Wheatley, SVP Marketing, Threat Intelligence and Influencer Communications at Fortinet.   Cybersecurity skills gap and shortage of talent […]

card__image

We should Learn How To Zero-Trust

Désolé, cet article est seulement disponible en Anglais et Ukrainien. Any CISO will tell you one of the biggest issues they face is insider threats — particularly in large organizations where sensitive data is plentiful and easy to take.   With the growing number of cyberattacks and data breaches, businesses are swiftly approaching more robust […]

card__image

The Deepfake is here. How to Protect Your Business

Désolé, cet article est seulement disponible en Anglais et Ukrainien. Amid pandemic disruptions, burnout, and geopolitically motivated cyberattacks, what are the challenges faced by business and security teams?   A new VMware, Inc. Global Incident Response Threat Report reveals that security teams are dealing with increased cyberattacks since Russia invaded Ukraine and other emerging threats […]