Remediant – The groundbreaking cyber solution for privileged access management transformation
Remediant: We live in a world where cyber-attacks are becoming more and more often. Usually, the main goal of these malicious attacks is to retrieve sensitive information about a user.…
Kaspersky Transparency Center
“The cybersecurity market needs to open up because customers need to trust it” The Russian invasion of Ukraine has changed world geopolitics and many companies’ fortunes. The international escalation between…
Cyber horror stories: The true horrors for this Halloween
Cyber horror stories: The Cyber Hell-Oween: It’s not about ‘IF’ but ‘WHEN’ will happen. Now that autumn is here, and the leaves have turned to gold, it’s officially that time of…
Career opportunity: The importance of cybersecurity
Career opportunity: Besides being a dominant theme due to the need to protect data from cybercriminal attacks, cybersecurity is today one of the best answers for young people looking for…
Naoris Protocol: Future of cybersecurity lies in Decentralized Mesh Architecture
By Monica Oravcova, COO of Naoris Protocol* Naoris protocol: Conversations around Cybersecurity used to be the sole domain of IT specialists, nerds, and some of the first security pioneers. Still,…
Zuul IoT – the gamechanger cyber startup
Zuul IoT is called the next generation of technology, a form of revolution that is changing and will continue to do further in our everyday lives. But with this technology’s…
Black Hat Hackers – Trying to Hack into their Mindset
Black hat hackers: Most people think that hackers are criminals. It is a common fact that most people don’t know that a broad category of hackers helps us differentiate them…
Talsec, our top suggestion when we talk about In-App security shielding.
Interview with Sergiy Yakymchuk, CEO of Talsec It is a very known fact that an average user uses a lot of apps during the day. All of these applications contain…
Korean start-up knows how to build steel armour against white-hat hacking
“Hacking” is generally understood as malicious activities to break into digital devices, software, and online networks. But Chanam Park’s interest has been particularly focused around white-hat hacking, which is to…
The double face of cryptocurrencies; Wanted or Banned
Cryptocurrencies: Bitcoin and Ethereum are the most popular, but 2022 will be the year of Solana It is almost like going back to the past with a world divided into…