1.7 C
Paris
Sunday, January 29, 2023

AUTHOR

Dimitris Gkoutzamanis

41 POSTS
Dimitris is an Information Technology and Cybersecurity professional with more than 20 years of experience in designing, building and maintaining efficient and secure IT infrastructures. Among others, he is a certified: CISSP, CISA, CISM, ITIL, COBIT and PRINCE2, but his wide set of knowledge and technical management capabilities go beyond these certifications. He likes acquiring new skills on penetration testing, cloud technologies, virtualization, network security, IoT and many more.

Why Is Database Encryption Important?

With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than...

Best Information Security Books

People refrain from reading either it is for pleasure or for professional and academic progression. If you are an information/cyber security professional who wants to...

How to get Cybersecurity experience as a beginner?

The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Why you should choose a career in cybersecurity

Cybersecurity is one of the fastest-growing and in-demand sectors today. In a previous article, I described the reasons why you should not get into...

Is there a difference between cybersecurity and information security?

There is a tendency to use the terms Cybersecurity (CS) and Information Security (IS) interchangeably. Even though the underlying principle is similar, there are...

Cool tools and accessories for your hacking bag

Besides being ... "cool", it is also extremely useful to have a bag ready with all your hacking tools and accessories ready to go....

New WatchGuard vulnerabilities could lead to appliance takeover

Ambisonics security engineer Charles Fol published an article last week, where he explains how he discovered 5 vulnerabilities and built 8 exploits to gain...

Why you should not get into cybersecurity

If you’re interested in cybersecurity, you should know that it’s not all sunshine and rainbows. The field is growing rapidly, but it is also...

Cybersecurity Analyst Interview Questions

The following list of questions is by no means exhaustive and some answers and explanations given for each are also non-exhaustive, but rather guidance...

Latest news