17.6 C
Munich
Sunday, July 21, 2024
- Advertisement -

ARCHIVE

Monthly Archives: September, 2022

Free Information Security Courses

In the age of information, learning is a choice, you just pay in time and effort instead of money. There are many free information...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Why you should choose a career in cybersecurity

Cybersecurity is one of the fastest-growing and in-demand sectors today. In a previous article, I described the reasons why you should not get into...

Flaws in Legacy Systems, BYOD and Remote Access: How they Impact Operations Security of the Enterprise

Many information security threats stem from vulnerabilities presented by outdated workstations, network devices, and mobile devices such as tablets and smartphones. These objects are...

Is there a difference between cybersecurity and information security?

There is a tendency to use the terms Cybersecurity (CS) and Information Security (IS) interchangeably. Even though the underlying principle is similar, there are...

Your Company’s Strongest Assets Are Its Weakest Links

The Numbers Don't Lie According to IBM Security’s Cost of a Data Breach Report 2022 calculations, the top five countries and regions for the highest...

Instagram fined $400M for abuse of children’s data

Ireland's data privacy regulator has agreed to impose a record fine of $402 million against Instagram following an investigation into its handling of children's...

Cool tools and accessories for your hacking bag

Besides being ... "cool", it is also extremely useful to have a bag ready with all your hacking tools and accessories ready to go....

New WatchGuard vulnerabilities could lead to appliance takeover

Ambisonics security engineer Charles Fol published an article last week, where he explains how he discovered 5 vulnerabilities and built 8 exploits to gain...

Customer data leaked in a newly disclosed Samsung breach

Samsung said that hackers have obtained some customer data in a newly disclosed breach. This breach comes after another intrusion that led to the leak...

Latest news

- Advertisement -