Why backing up data isn’t optional anymore
Backing up data: Data nowadays is considered more than just the files on your desktop or the pictures in the cloud. It's your digital identity, your job, and your memories. From ransomware attacks to hardware failures, unfortunately, losing your data
The Cyber Resilience Act decoded: what engineers need to know
We've all seen the headlines. "Cyber Resilience Act adopted by the EU. Manufacturers must comply." But reading the press release isn't enough. I took the time to go through the full regulation, the legal summaries, and the expert commentary, and
Top 5 password managers for 2025
"You shall not pass" should be your motto for 2025. Hackers, bots, shady pop-ups, everyone's trying to get through the gates. But with the right password manager, you're not just locking the door, you are putting a wizard at the
XDR vs. SIEM: which one does your business need?
XDR vs SIEM: The world of cybersecurity is full of names like XDR, SIEM, EDR, and MDR. Therefore, it's easy to get lost in these words and forget that they stand for real-world security needs. In order for businesses to
What is threat intelligence and why does it matter in cybersecurity
More and more, cyber threat intelligence is being acknowledged as an essential component of contemporary cybersecurity. With global cyber attacks rising by 125% in 2021 compared to the prior year, organizations are under pressure to anticipate threats rather than just
Meet the talent: Ahmed Hassan, Cyber Security Engineer & Penetration Tester
Place of residence: Vienna, Austria Position: Cyber Security Engineer & Penetration Tester Please describe a day in your life The day begins with a review of the current project, ensuring all objectives and timelines are clearly understood. A brief meeting with the
How to build a strong Threat Intelligence program in your SOC
From a supporting role to a vital component of successful cybersecurity strategy, threat intelligence has evolved over time. To stay ahead of attackers, security operations centres (SOCs) need to improve their threat data lifecycle as cyber threats get smarter. But
DeepSeek: where is our data really going?
Another strong competitor in the competitive game of AI tools is the new Chinese AI firm DeepSeek. It became very popular very quickly; within a week of its release, it topped the app store charts in the US, which has not
All the cybersecurity risks that come with AI agents
A new era of automation and efficiency has been brought about by the quick adoption of artificial intelligence (AI), with AI agent-based systems leading the way. From cybersecurity and finance to healthcare and customer service, these intelligent, self-governing systems are