1.7 C
Paris
Sunday, January 29, 2023

Articles

Most Organizations Still Vulnerable To The Log4j Vulnerability

A study examining the scope and impact of the recent Log4j vulnerability has been conducted by Tenable and the results are extremely interesting. According to...

What is a Vishing Attack?

Social engineering attacks use the “human loophole” to get around security controls. Instead of hacking your accounts to steal your identity, they hack you....

Why Is Database Encryption Important?

With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than...

Cybercrime: Face the Facts

We need to face some hard facts, to move forward. Fact #1: cybercrime is here to stay It has been around for many decades, but in...

Steps to a Secure Portfolio: Due Diligence During M&A & Beyond

Did you know that less than five percent (5%)1 of organizations engaging in mergers and acquisitions (M&A) will consider cybersecurity risk assessments during the...

How to get Cybersecurity experience as a beginner?

The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Why you should choose a career in cybersecurity

Cybersecurity is one of the fastest-growing and in-demand sectors today. In a previous article, I described the reasons why you should not get into...

Flaws in Legacy Systems, BYOD and Remote Access: How they Impact Operations Security of the Enterprise

Many information security threats stem from vulnerabilities presented by outdated workstations, network devices, and mobile devices such as tablets and smartphones. These objects are...

Is there a difference between cybersecurity and information security?

There is a tendency to use the terms Cybersecurity (CS) and Information Security (IS) interchangeably. Even though the underlying principle is similar, there are...

Your Company’s Strongest Assets Are Its Weakest Links

The Numbers Don't Lie According to IBM Security’s Cost of a Data Breach Report 2022 calculations, the top five countries and regions for the highest...

Why you should not get into cybersecurity

If you’re interested in cybersecurity, you should know that it’s not all sunshine and rainbows. The field is growing rapidly, but it is also...

Latest