Home Search
data privacy day - search results
If you're not happy with the results, please do another search
Superhero Passwords Become Kryptonite: Mozilla Warns
The significance of keeping strong passwords while talking about data privacy and security cannot be ignored. Despite several awareness campaigns, many people still reuse...
Common Web Application Attacks
Amidst the pandemic, there has been an exponential rise in the number of businesses embracing digital transformations like web applications to streamline their workload...
The Increase in Scope of Cybersecurity from Software to Hardware Protection
When we think of cybersecurity our mind automatically goes to powerful software protecting “soft” assets i.e. data that could range from massive enterprise-grade datastores to tiny...
How to Stay Safe Online: Six Security Tips for Kids
Though the Internet is a good resource for endless knowledge, it also has its share of risks. Unlike adults, most kids and teens are...
The Cloud is New Territory for Computer Forensics
Volumes have been written extolling the virtues and benefits of cloud computing. The cloud enables organizations to scale up rapidly and to be more...
The Importance of Team Diversity in Detecting Phishing Scams
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
Challenges and Applications of Digital Forensics
Crimes committed within the electronic or digital domains, particularly within cyberspace, have become general. They use technology as a footprint, commit offenses, and create...
“I expect security options to evolve over time with the rollout of 5G”
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...
“I am eagerly waiting for more innovation in incident response and supply chain security”
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
A CEO’s Guide to Cybersecurity
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....