Cloud, Edge and IoT trichotomy: cybersecurity concerns

The cybersecurity issues of the Cloud, Edge and IoT trichotomy are inevitably related to all of these complementary technologies. Cloud Computing is the delivery of on-demand computing services without direct active management by the user. These services range from applications to storage and processing power obtained from the remote data centres and available large number …

Continue reading Cloud, Edge and IoT trichotomy: cybersecurity concerns

Do you think that incoming emails are the most dangerous? You might be wrong…

Email is one of the primary ways we communicate and is an almost universal technology, making it perfect for attackers to reach their victims. Outgoing emails can be even more hazardous than incoming ones. Running and securing business in the cyber environment in these pandemic and economic crisis times can be hard. The rapid progression …

Continue reading Do you think that incoming emails are the most dangerous? You might be wrong…

Antivirus vs Anti-malware simplified but it is also the matter of doctrine…

An endless maze of cybersecurity is, however, not a simple choice between technology tools. Hence, after discussing the above dilemma of interest to common folks, we continue with teasing cybersecurity professionals and policymakers with fitting it in the cybersecurity doctrines. WatchGuard’s Threat Lab has recently published a reporton the latest malware and Internet attacks showing …

Continue reading Antivirus vs Anti-malware simplified but it is also the matter of doctrine…

The greatest cybersecurity threat still stubbornly persists – and is possibly growing!

For one filed cybersecurity professional position on the market in 2020, there will be at least three vacant positions. Often overworked, underappreciated and frequently blamed for a single failure and unacknowledged for successes, cybersecurity professionals tend to become ‘alien gem’. Our reality: almost anybody can become a cybercriminal In mid-May 2020, multiple supercomputers in European …

Continue reading The greatest cybersecurity threat still stubbornly persists – and is possibly growing!