cybersecurity

BYOD Lax Policies A Problem For All Firms 1

BYOD Lax Policies, A Problem For All Firms

At the turn of the 2010s decade, companies started to realize that nothing can stop the BYOD (Bring Your Own Device) trend. Smartphones and tablets who used to be luxury…

Read More
Top 3 Cybersecurity Measures Skepticism Awareness and Training

Top 3 Cybersecurity Measures: Skepticism, Awareness and Training

What will you think of when you hear the word “information leak due to unauthorized access“? Why data breach incidents does not decrease? One of the reasons is the sophistication…

Read More
Open EDR
Microsofts Windows 7 8.1 To Have Defender Advanced Threat Protection

Microsoft’s Windows 7, 8.1 To Have Defender Advanced Threat Protection

According to the news on ZedNet, Windows Defender Advanced Threat Protection (ATP) will be available for Windows 7 and Windows 8.1. It was revealed by Microsoft officials how they planned…

Read More
IDS IPS and Their Role in Cybersecurity

IDS, IPS and Their Role in Cybersecurity

IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems) are crucial components of cybersecurity in today’s context. Before comparing IDS and IPS, let’s go in for a brief introduction of…

Read More
Australian Cyber Security

The Australian Pre-Election Cyber Attacks and After!

Scott Morrison, the Prime Minister of Australia himself publicly disclosed that the Parliament House network and political parties of Australia were absorbing a number of cyber attacks for weeks. Morrison…

Read More
NASA’s 35 Day Partial Shutdown A Step Towards Better Lives

NASA’s 35-Day Partial Shutdown A Step Towards Better Lives

The 35-day long U.S. Government shutdown has not only delayed basic government services and underfunded the operations of many state agencies and companies, but also caused a lot of missed…

Read More
Ways Social Engineering Steals Money From The Elderly

Ways Social Engineering Steals Money From The Elderly

Social Engineering has been a very successful technique for cybercriminals in extracting information from innocent users and use it for fraudulent purposes, all without the knowledge of the users. The…

Read More
Ways To Make The Human Factor A Non Issue In Cybersecurity

Ways To Make The Human Factor A Non-Issue In Cybersecurity

The implementation of adequate computer security measures requires contemplating technical, organizational and legal aspects, however, in many cases very little attention is paid to the importance of the human factor…

Read More
Importance of Employee Awareness and Training For Cyber Security

Importance of Employee Awareness and Training For Cyber Security

The healthcare industry is one of the last sectors of the society that practice regular update cycles for their computer systems, that is the main factor why cybercriminals love to…

Read More
Cyberwarfare Up Close United States Forces Vs North Korean Joanap Botnet

Cyberwarfare Up-Close: United States Forces Vs North Korean Joanap Botnet

A team composed of members coming from U.S. Airforce, DOJ and FBI are assembled in order to track down and stop the operation of the alleged North Korean-funded botnet named…

Read More

Page 9 of 16

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register