Remediant – The groundbreaking cyber solution for privileged access management transformation
Remediant: We live in a world where cyber-attacks are becoming more and more often. Usually, the main goal of these malicious attacks is to retrieve sensitive information about a user.…
Cyber War: China and Taiwan
The United States House Speaker Nancy Pelosi’s trip to Taiwan made headlines in the region before and after the landing on 2 August. A few days before her trip, Chinese…
Cyber Halloween – Just take the treat, but do not get tricked
Cyber Halloween is just around the corner, and you can already sense the spookiness in the air. But this month is not all about Halloween, tricks, and treats; it is…
Cyber horror stories: The true horrors for this Halloween
Cyber horror stories: The Cyber Hell-Oween: It’s not about ‘IF’ but ‘WHEN’ will happen. Now that autumn is here, and the leaves have turned to gold, it’s officially that time of…
Career opportunity: The importance of cybersecurity
Career opportunity: Besides being a dominant theme due to the need to protect data from cybercriminal attacks, cybersecurity is today one of the best answers for young people looking for…
Naoris Protocol: Future of cybersecurity lies in Decentralized Mesh Architecture
By Monica Oravcova, COO of Naoris Protocol* Naoris protocol: Conversations around Cybersecurity used to be the sole domain of IT specialists, nerds, and some of the first security pioneers. Still,…
Zuul IoT – the gamechanger cyber startup
Zuul IoT is called the next generation of technology, a form of revolution that is changing and will continue to do further in our everyday lives. But with this technology’s…
Alicia Fawcett, Teaching Cybersecurity
Teaching Cybersecurity: How has academia changed in the last two years? Which method do students prefer to study? (physical attendance, online learning, etc.) It really depends on the type of…
Australian government slams Optus for cybersecurity breach
By Sonali Paul MELBOURNE (Reuters) -The Australian government on Sunday levelled its harshest criticism yet against Optus, the second-biggest telecoms company, for a cybersecurity breach that affected the equivalent of 40% of…
ThreatQuotient, a manageable and proactive approach to cybersecurity
When it comes to computer security, we must consider the incredible progress the sector has made in recent years. In less than a decade, technologies such as artificial intelligence and…