Ransomware: To pay or not to pay The main goal of hackers when carrying out a...
CATEGORIES
cybersecurity
Why Zero Trust?
Zero Trust This concept was coined in 2010 by John Kindervag, a former...
Cybersecurity Trends in 2023
Cybersecurity Trends in 2023 According to a report recently published by the...
Today is the International Computer Security Day
Today is the International Computer Security Day Every November 30th is International Computer Security Day. The holiday started in 1988 when technological progress brought new concerns about...
The Uber breach
In September, ridesharing company Uber disclosed that hackers had stolen the personal information of about 57 million customers and drivers. The days following the attack were full of speculation...
Organizations must focus more on protecting their IAM infrastructure
There are many trends in cybersecurity today, as organizations battle ever more cunning and prevalent cybercriminals; new tools and methods are emerging all the time. Sophisticated threat actors are...
Social Media Data Leaks: an increasingly data theft
Personal data leaks have occurred to both large and small businesses. In addition, it happens very frequently, more and more in recent years. Most of them are a consequence of cyber-attacks on networks or e-commerce security breaches. Incidents such as these can...
Cybersecurity into the company ‘s DNA
The company of today, both private and public, face a daunting variety of threats to cybersecurity. A cyber attack can threaten the very existence of an organization. And even the jobs of some of its C-suite officers. But the response doesn't rest solely on a building...
The Strategic of Cybersecurity Skills
Evidence suggests there is a global cybersecurity skills shortage affecting businesses and governments alike. Which means that organizations are struggling to fill their cybersecurity vacancies. With the volume and severity of breaches in recent years, it’s...
Password security : Are passwords becoming a weak spot at companies?
Passwords are designed to give you access to an online world while companies protecting your information. However, password security can lead to attacks. This first point of cybersecurity is becoming a weak spot that can involve dire consequences if unaddressed for...