card__image

100% security — mission impossible?

Извините, этот текст доступен только на “Английский” и “Украинский”. At some point CIOs and CISOs have inevitably to provide a smart and clear answer to the sensitive question from the Board of Directors: Are we 100% secure?   So, how does a security-conscious leader answer such an essential question in a practical, business-focused manner? Here […]

card__image

4 key mistakes CISO make at board meetings

Извините, этот текст доступен только на “Английский” и “Украинский”. Presenting to the board is a challenging opportunity. CIOs and CISOs would be wise to check their assumptions, know their audience, anticipate off-agenda questions, and steer clear of scare tactics.   It’s not uncommon for CIOs, CISOs, and sometimes their direct reports to be called on […]

card__image

Zero Trust Security: Benefits and Disadvantages

Извините, этот текст доступен только на “Английский” и “Украинский”. As threat actors become increasingly sophisticated, enterprises face a constant battle to keep their security policies and controls on pace with the evolution of threats. The attack surface continues to widen as the technology landscape becomes more complex, increasing the opportunities for hackers to cause widespread […]

card__image

The thin line between cybercrime and ethical hacking — the 15 types of hackers you need to know in 2023

Извините, этот текст доступен только на “Английский” и “Украинский”. Who’s trying to hack you? More people than you think. Today, everything from your phone to your crypto wallet to your smart fridge can be hacked. But are all hackers dangerous?   Black hat, green hat, blue hat — these are just a few types of […]

card__image

Nearly two thirds of CISOs have had to deal with the loss of sensitive data in the past 12 months — Proofpoint report

Извините, этот текст доступен только на “Английский” и “Украинский”. Cybersecurity company Proofpoint released its annual Voice of the CISO report, which explores key challenges, expectations, and priorities of chief information security officers (CISOs).   CISOs AGREE THAT THEIR ORGANIZATION IS AT RISK OF A MATERIAL CYBER ATTACK IN THE NEXT 12 MONTHS   According to […]

card__image

Your password can be exposed in seconds

Извините, этот текст доступен только на “Английский” и “Украинский”. When did you last update your passcodes? Cybersecurity experts say 95% of cyber-attacks are due to human error.   Nowadays, everything requires a login and passcode. There is nothing new to say that there are people on the Internet who are willing to find out any […]

card__image

Более 40% ИТ-специалистов скрывают информацию о киберинцидентах

Поскольку фишинг и атаки программ-вымогателей набирают обороты, половина компаний столкнулись с тем или иным видом киберугроз за последний год.   Представьте, что в вашей компании произошла серьезная утечка данных, но вместо того, чтобы проинформировать соответствующие стороны и принять необходимые меры, вам приказали молчать!   Новое исследование, проведенное компанией по кибербезопасности Bitdefender, показало, что это реальная […]

card__image

Future and cybersecurity — interview with Vitaliy Yakushev

Извините, этот текст доступен только на “Украинский”. Як відбувається все у кібернетичному просторі, як ламається людські долі через те, що ламається комп’ютер. Що таке для тебе майбутнє? Майбутнє – це кожна секунда, яка буде після цієї секунди, тобто все, що буде через секунду, хвилину, рік. Можливо, дуже сподіваємося 10 років, якщо ми не загинемо в […]

card__image

Penetration Testers With or Without Vulnerability Scanners?

Извините, этот текст доступен только на “Английский” и “Украинский”. Vulnerability scanning is a common practice for businesses to verify and improve security controls. So, it is often heard that it can replace penetration testing. And while vulnerability scanning and penetration testing are supposed to help identify vulnerabilities, they are in fact two separate and distinct […]

card__image

Cherchez la Femme or at least 30% of «Cyber-Criminals» are women – Report

Извините, этот текст доступен только на “Английский” и “Украинский”. Women in cybercrime are more common than you think. The Infosecurity world moves at a glacial pace toward gender equity. A new study into gender and cybercrime has found that the criminal underground may be more accepting of women than the wider industry.   According to […]