Alphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…
Read MoreAlphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…
Read MoreAt the turn of the 2010s decade, companies started to realize that nothing can stop the BYOD (Bring Your Own Device) trend. Smartphones and tablets who used to be luxury…
Read MoreWhat will you think of when you hear the word “information leak due to unauthorized access“? Why data breach incidents does not decrease? One of the reasons is the sophistication…
Read MoreAccording to the news on ZedNet, Windows Defender Advanced Threat Protection (ATP) will be available for Windows 7 and Windows 8.1. It was revealed by Microsoft officials how they planned…
Read MoreIDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems) are crucial components of cybersecurity in today’s context. Before comparing IDS and IPS, let’s go in for a brief introduction of…
Read MoreScott Morrison, the Prime Minister of Australia himself publicly disclosed that the Parliament House network and political parties of Australia were absorbing a number of cyber attacks for weeks. Morrison…
Read MoreThe 35-day long U.S. Government shutdown has not only delayed basic government services and underfunded the operations of many state agencies and companies, but also caused a lot of missed…
Read MoreThe implementation of adequate computer security measures requires contemplating technical, organizational and legal aspects, however, in many cases very little attention is paid to the importance of the human factor…
Read MoreThe healthcare industry is one of the last sectors of the society that practice regular update cycles for their computer systems, that is the main factor why cybercriminals love to…
Read More