card__image

Who’s Who In Ransomware

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Ransomware is one of the most virulent and difficult security challenges organizations […]

card__image

Zero-Day Vulnerabilities: Cases about Consequences from 17 members of Forbes Technology Council

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Zero-day vulnerabilities are flaws or weaknesses in software or an operating system […]

card__image

100% security — mission impossible?

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. At some point CIOs and CISOs have inevitably to provide a smart […]

card__image

4 key mistakes CISO make at board meetings

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Presenting to the board is a challenging opportunity. CIOs and CISOs would […]

card__image

Zero Trust Security: Benefits and Disadvantages

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. As threat actors become increasingly sophisticated, enterprises face a constant battle to […]

card__image

The thin line between cybercrime and ethical hacking — the 15 types of hackers you need to know in 2023

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Who’s trying to hack you? More people than you think. Today, everything […]

card__image

Nearly two thirds of CISOs have had to deal with the loss of sensitive data in the past 12 months — Proofpoint report

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. Cybersecurity company Proofpoint released its annual Voice of the CISO report, which […]

card__image

Your password can be exposed in seconds

Извините, этот текст доступен только на “Английский” и “Украинский”. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. When did you last update your passcodes? Cybersecurity experts say 95% of […]

card__image

Более 40% ИТ-специалистов скрывают информацию о киберинцидентах

Поскольку фишинг и атаки программ-вымогателей набирают обороты, половина компаний столкнулись с тем или иным видом киберугроз за последний год.   Представьте, что в вашей компании произошла серьезная утечка данных, но вместо того, чтобы проинформировать соответствующие стороны и принять необходимые меры, вам приказали молчать!   Новое исследование, проведенное компанией по кибербезопасности Bitdefender, показало, что это реальная […]

card__image

Future and cybersecurity — interview with Vitaliy Yakushev

Извините, этот текст доступен только на “Украинский”. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Як відбувається все у кібернетичному просторі, як ламається людські долі через те, що ламається комп’ютер. Що таке для тебе майбутнє? Майбутнє – це […]