“If you see hackers, you see Usi,” someone once suggested I use this line to introduce myself. Perhaps they presumed that people who do not know me would easily remember…

Category
“If you see hackers, you see Usi,” someone once suggested I use this line to introduce myself. Perhaps they presumed that people who do not know me would easily remember…
In April 2021, the IT Security Act 2.0 was passed by the German Federal Ministry of the Interior. Among other things, the regulation provides for changes in connection with the…
In order to be able to discuss the similarities and differences between the three frameworks, we need to understand the background of each one. There certainly are some similarities between…
How it started My passion for electronics and communication started at a very young age. It was a hobby that took most of my time throughout school and until I…
The corruption of resources to the people who need them undermines trust in institutions and exacerbates the great inequalities in today’s society. For this reason, the fight against corruption is…
The value Is in the system Technologies rarely exist within a vacuum. We typically invent and build new technologies by using existing ones. IoT, big data, and the cloud are…
In cybersecurity, humans are often seen as the weakest link, as attackers use social engineering techniques to infiltrate organizations, so they can launch ransomware or cause a data breach. According…
Ethical hacking and cloud computing have been continuously developing and improving over the years, and they have become essential services in today’s technological and business world. As millions of people…
We do business in an increasingly complex world of bytes, account numbers, and passwords. Nearly everything in our lives is now stored on a cloud. But our reliance on technology…
Since spring 2020, cyberattacks have skyrocketed, and in a way, COVID-19 exposed new cybersecurity threats that organizations were not aware of, and not prepared to deal with. Not expecting to…