MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS
More and more brands are opting for proxies, especially China proxies, that help them access Chinese websites and extract data for better decision-making.
August 2023
A BRIEF HISTORY OF DATA LOSS PREVENTION
Take a trip down memory lane to learn how the internet evolved, how data loss prevention (DLP) solutions fulfilled the security gap and where we go from here regarding DLP both now and in the future.
July 2023
THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
This article will explain cybersecurity awareness and dive deeper into the five essential tips to include in your security awareness training program to make your digital environments more secure.
June 2023
THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Learn how to protect your app data using this 8-step security checklist. This article discusses crucial security measures to keep your apps safe in 2023.
April 2023
WHAT TO DO WHEN YOUR EMPLOYEES ARE A CYBER SECURITY RISK
What can you do if you’ve identified an employee as a cyber security risk? Let’s explore appropriate responses.
March 2023
THE NETWORK SECURITY CHALLENGE: IMPROVING VISIBILITY TO DEFEND AGAINST CYBERTHREATS
By Kev Eley, Vice President Sales UK and Europe at LogRhythm
January 2023
KEEPING YOUR MEDIA CONTENT SAFE AND SECURE WITH THESE HELPFUL STEPS
For those of us working and operating in the digital landscape, keeping our content safe and secure is a number one priority.
December 2022
SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles
November 2022
3 STRATEGIES TO MITIGATE INSIDER THREATS IN YOUR ENTERPRISE
September 2022
By Martin Lee, Technical Lead, Security Research – EMEA, Cisco Talos Security Intelligence & Research
May 2022
By Eyal Dorfman
May 2022
By Iron Range Cyber
April 2022
With ransomware attacks in the healthcare sector on the rise, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shares his thoughts on how healthcare organisations can avoid becoming a victim of cyber criminals.
By James Rees, Managing Director, Razorthorn Security
FUELLING THE TALENT PIPELINE IN LONDON REQUIRES SERIOUS INVESTMENT IN CYBER SKILLS
By Dr Vahid Heydari Fami Tafreshi, senior lecturer in Cybersecurity and Networks, Computing Courses Provision Manager at Staffordshire University London
December 2021
By Ruben Bonan Founder of Marketing Marvel
July 2021
By Haya Altaleb and Rajnai Zoltán, Óbuda University, Doctoral School on Safety and Security Sciences
By Dr. Katalin Szenes CISA, CISM, CGEIT, CISSP and Bence Tureczki PhD student, AI – Blockchain – Security Knowledge Center of Óbuda University
February 2021
AND WHY YOU SHOULD CARE
By Ramil Khantimirov, CEO and co-founder of StormWall
By David Balaban, computer security researcher
By Annamária Beláz and Zsolt Szabó, Doctoral School on Safety and Security Sciences, Óbuda University, Budapest, Hungary
September 2020
By Döníz Borsos PhD student, Óbuda University, Doctoral School on Safety and Security Sciences, Hungary
August 2020
By Barnabás Sándor, Óbuda University, Doctoral School for Safety and Security Sciences, Budapest, Hungary
By Csaba Fenyvesi and Ana Miletic
December 2019
SIMPLIFYING IDENTITY AND ACCESS MANAGEMENT FOR MORE BUSINESSES
By Karthik Lakshminarayanan, Director, Product Management, Cloud Identity, Google
October 2018
By Scott Coleman, Director of Product Management – Owl Cyber Defense Solutions
By Veselin Monev, information security and compliance practitioner
August 2018
HUMAN BEHAVIOUR AND DIGITAL TRUST: HOW UNEXPECTED REWARDS CAN IMPROVE CYBERSECURITY, PROTECT CRITICAL INFRASTRUCTURE AND REDUCE COSTS
By Chris A. Jones, George Runger and Jack Caravelli
August 2018
PSD2 – WILL IT BE A GOLD RUSH FOR CYBERCRIMINALS
By Pedro Fortuna, CTO at Jscrambler (www.jscrambler.com)
July 2018