Cybersecurity in healthcare, key trends to monitor
Cybersecurity in healthcare: As revealed by the latest industry reports, in 2023, the healthcare sector was the fourth most affected by successful cyber-attacks after Manufacturing, Professional/Scientific/Technical, and ICT. It accounted for 9% of the total number of incidents reported, registering
How to recognize if someone is stalking your Instagram profile
Swipe, double-tap, swipe. It's the digital world we've all become involved in the captivating reels of Instagram. As our fingers swipe over and over on phone displays, we increasingly share and see more than ever before. But have you ever
Generative AI, a new threat to cybersecurity
ChatGPT, Deepfakes, and more sophisticated phishing scams are the biggest dangers for companies, which must learn to master AI to defeat it. With ChatGPT4, the world has discovered the potential of generative artificial intelligence, a technology destined to change the tech sector and
Meet István Szénási, the Head of Application Security at Emarsys, in Hungary
Meet the Head of Application Security at Emarsys in Hungary, SAP's customer engagement platform. István Szénási is responsible for the secure development and operation of their SaaS product; he brings expertise in vulnerability management, incident response, and security awareness. Additionally, he advises
The job of the future is the SOC manager
A Security Operations Center (SOC) manager is responsible for overseeing the day-to-day operations and strategic direction of a SOC. The SOC is an organization's dedicated team or department that monitors, detects, analyzes, and responds to cybersecurity incidents and threats. The SOC manager
Secondhand marketplace become target of cybercrime in South Korea
Secondhand marketplace: In South Korea, obtaining a used item through online platforms has been popular for the past few years but gained even bigger momentum since the pandemic. According to Job Korea's survey in 2021, more than 75 per cent of consumers
Chronicle of a valuable working day dedicated to cybersecurity
Cybersecurity working day: I was sent to Padua to attend 'Reaction - A day to face the rapidly evolving challenges of cybersecurity', a conference dedicated to cybersecurity companies. Usually, I attend these types of events to report on them in an article
VPN for dummies: what it is and why you SHOULD care
VPN for dummies: We’ve all heard the term ‘VPN’ being thrashed about in the tech world, but what exactly is it, and what do those letters stand for? VPN popularity has soared over the past few years due to increased security
Why Infrastructure as Code (IaC) can improve app security
IaC: Infrastructure is one of the fundamental principles of a software development process: it is directly responsible for the stable operation of an application. This infrastructure can range from servers, load-balancing systems, firewalls and databases to complex container clusters. Infrastructure considerations