Don’t want to be a victim of social engineering – learn 3 ways to defend yourself

People  like computers can be hacked and there is a chance that an attack on another one could start with an...
Read more

Cybersecurity Analytics. And more specifically…?

The IT world is full of principles and good practices for maintaining cybersecurity - NIST Cybersecurity...
Read more

IoT devices why they are prone to vulnerabilities and how to protect them

Devices connected in Internet of Things - IoT - are entering every aspect of our lives. In our homes, office...
Read more

What is ISO 27001 and why it is so important to an organization

The vast majority of organizations - commercial and public, have some form of control over classified inform...
Read more

Few words on businss metrics for IT Security

"If you cannot measure it, you cannot improve it" - these are the words quoted in many managerial trainings....
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info