Articles


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS
More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.
August 2023


A BRIEF HISTORY OF DATA LOSS PREVENTION
Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.
July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
This article will explain cybersecurity awareness and dive deeper into the five essential tips to include in your security awareness training program to make your digital environments more secure.
June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Learn how to protect your app data using this 8-step security checklist. This article discusses crucial security measures to keep your apps safe in 2023.
April 2023


WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK
What can you do if you’ve identified an employee as a cyber security risk? Let’s explore appropriate responses.
March 2023


THE NETWORK SECURITY CHALLENGE:  IMPROVING VISIBILITY TO DEFEND AGAINST CYBERTHREATS
By Kev Eley, Vice President Sales UK and Europe at LogRhythm
January 2023


KEEPING YOUR MEDIA CONTENT SAFE AND SECURE WITH THESE HELPFUL STEPS
For those of us working and operating in the digital landscape, keeping our content safe and secure is a number one priority.
December 2022


SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles
November 2022


3 STRATEGIES TO MITIGATE INSIDER THREATS IN YOUR ENTERPRISE
September 2022


ADAPTING TO A CHANGING THREAT LANDSCAPE
By Martin Lee, Technical Lead, Security Research – EMEA, Cisco Talos Security Intelligence & Research
September 2022


9 CRUCIAL CYBERSECURITY TIPS FOR YOUR VIRTUAL EVENT
May 2022


CYBERSECURITY TRENDS IN 2022
By Eyal Dorfman
May 2022


INCIDENT RESPONSE SERVICES: WHO’S IT FOR?
By Iron Range Cyber
April 2022

HOW HOSPITALS CAN PREVENT A CYBERSECURITY CRISIS IN HEALTHCARE
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.
April 2022


THE UK NATIONAL CYBER STRATEGY 2022: DOES IT GO FAR ENOUGH & WHAT’S TO COME?
By James Rees, Managing Director, Razorthorn Security
March 2022

FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London
December 2021


WHAT ARE THE LATEST CYBERSECURITY STANDARDS?
By Ruben Bonan Founder of Marketing Marvel
July 2021

A BRIEF OVERVIEW OF SYSTEMS RELIABILITY
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences
May 2021


SUPPORTING CORPORATE GOVERNANCE ON A BLOCKCHAIN BASIS
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University
February 2021

DDOS PANDEMIC: HOW THE CORONA CRISIS SPURRED SOME OF THE BIGGEST DDOS ATTACKS
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall
February 2021


HOW RANSOMWARE AUTHORS HIT HEALTHCARE SECTOR
By David Balaban, computer security researcher
September 2020

THE HUMAN FIREWALL – THE HUMAN SIDE OF CYBER SECURITY
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary
September 2020

APPLICATIONS OF LORAWAN TECHNOLOGY
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary
August 2020

WARFLYING – 2.4 GHZ AND 5 GHZ WIRELESS NETWORK DETECTION BY DRONE IN CRITICAL INFRASTRUCTURE
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
March 2020


MONITORING AND ANALYZING SOCIAL MEDIA TO PROTECT CRITICAL INFRASTRUCTURE
By Csaba Fenyvesi and Ana Miletic
December 2019

SIMPLIFYING IDENTITY AND ACCESS MANAGEMENT FOR MORE BUSINESSES
By Karthik Lakshminarayanan, Director, Product Management, Cloud Identity, Google
October 2018


WHAT IF YOU CAN’T PATCH? 
By Scott Coleman, Director of Product Management – Owl Cyber Defense Solutions
September 2018


COGNITIVE BIASES IN INFORMATION SECURITY CAUSES, EXAMPLES AND MITIGATION
By Veselin Monev, information security and compliance practitioner
August 2018

HUMAN BEHAVIOUR AND DIGITAL TRUST: HOW UNEXPECTED REWARDS CAN IMPROVE CYBERSECURITY, PROTECT CRITICAL INFRASTRUCTURE AND REDUCE COSTS
By Chris A. Jones, George Runger and Jack Caravelli
August 2018


PSD2 – WILL IT BE A GOLD RUSH FOR CYBERCRIMINALS
By Pedro Fortuna, CTO at Jscrambler (www.jscrambler.com)
July 2018