Search for content, post, videos
0 COMMENT
5102 Views
The Use of Blockchain in Cybersecurity

These days cyber-attack trends are increasing in magnitude, frequency, and sophistication constantly. In recent years, we have witnessed escalated cyberattacks, such as distributed denial of service (DDoS) attacks, phishing, ransomware attacks, man-in-a-middle (MiTM) attacks, SQL injection, and much more, aimed at major networks like Mailchimp, LinkedIn, Canva, Google, Amazon, CNA,…

0 COMMENT
2072 Views
Everything is Connected

There are few issues on which all countries can agree, but almost every UN state has committed to the Paris Agreement on climate change. It is unsurprising that the need to stem environmental degradation – from depletion of natural resources to the endangerment of entire ecosystems – is a near-consensus…

0 COMMENT
2360 Views
Ensure Your Cyber Safety – Essential Reads

Due to the misuse of data and the rise in cyber-attacks, ethical hacking, network security, and cybersecurity have also been on the rise as many organizations rely on them to stay safe and secure. The need to have your data protected has become very prominent as cyber threats evolve on…

0 COMMENT
3300 Views
My Success Story Jan Carroll

In May 2021, Ireland suffered its most catastrophic cybersecurity attack to date. Our Health Service Executive, which manages our national health service of 4,000 locations, 54 acute hospitals, and over 70,000 devices, suffered a Conti ransomware attack from the Russia-based Wizard Spider group. Almost immediately, the IT systems were shut…

0 COMMENT
2140 Views
Beyond The Sea

In mobilizing divers to be a force for good, scuba diving can help to promote marine conservation. Here are three ways in which ISO standards support this effort. Diving Sustainably Scuba diving is the passion of millions of people around the globe, all with one thing in common – a…

0 COMMENT
2432 Views
Ethical Hacking vs Penetration Testing

During the last decade, we have faced the grim reality that is cyber-attacks in their most sophisticated forms. Incidents orchestrated by malicious actors that tested many companies’ cybersecurity practices, and even brought other companies to bankruptcy. The goals for such attacks often vary, depending on the actor, malicious actors do…

0 COMMENT
1869 Views
Towards a Circular Economy

Catherine Chevauché is leading the charge on the circular economy. Here, she explains the scale of the challenge and how we can rise to it. The circular economy is considered a pillar of climate action. As opposed to the linear model of production and consumption which evolves along the stages…

0 COMMENT
2955 Views
What Do Cyber-Attacks Entail?

The cyber world is growing rapidly. Everyone is involved, either directly or indirectly. Everything is available with a single click or tap on your mobile, tablet, or PC. You can browse websites, listen to or download audio, video, and software, place your order, buy products, book tickets, hotels, buses, taxis,…