The 21st century presents a series of transformations in the business environment and in people’s lives in relation to the 20th century. The concentration of people in large urban centers, difficulties of locomotion, and social interaction, the need for agility and availability of communication, and not to say, promote physical…
Tag
Cybersecurity
Organizations today are facing fascinating, yet distressing advancements of technology. The evolution of technology and its wide application has come with many limitations, challenges, and countless sophisticated risks. The frequency of cyber-attacks has grown exponentially during the last few years and hearing news of big data breaches is becoming very…
Cyber-attacks are a key concern for every organization today. As the development of more new technology to make lives better increases, the chance of being a victim of a cyber-attack is also on the rise as every system supposedly has a vulnerability that attackers can exploit to compromise the system…
These days cyber-attack trends are increasing in magnitude, frequency, and sophistication constantly. In recent years, we have witnessed escalated cyberattacks, such as distributed denial of service (DDoS) attacks, phishing, ransomware attacks, man-in-a-middle (MiTM) attacks, SQL injection, and much more, aimed at major networks like Mailchimp, LinkedIn, Canva, Google, Amazon, CNA,…
As most involved in the cybersecurity field, my day also consists of a long and tiring schedule, but also as most cybersecurity experts, I love my job and this industry. Working towards a better and more secure digital space is a great motivation each morning. Because of this field I…
Artificial Intelligence (AI) continues to be one of the most discussed topics in the industry of information security, and its impact has been changing cybersecurity for some time now. As technology becomes more advanced every day, so do cyber-attacks. Cybercriminals are using sophisticated and innovative tools to attack organizations or…
Cyber-attacks are costly, disruptive and a growing threat to business, governments, and society alike. Happily, an arsenal of standards helps stay ahead of the game. Cybercrime is on the rise. And as we move deeper into the digital age, the era of the so-called Fourth Industrial Revolution, it is also…
The traditional concept of IT Disaster Recovery (DR), i.e. the solution where an organization sets up an alternate site where servers, applications, and data can be used in case the primary data center burns down, floods, loses power, or otherwise fails, needs to be re-thought completely due to two major…
Supply chain security activities aim to amplify the security of supply chains, transport, and logistic systems for the world’s cargo and to facilitate legitimate trading. Their objective is combining traditional practices of supply chain management with the security requirements driven by threats, such as; terrorism, piracy, and theft. Digital supply…
In January 2014, SAE International, formerly known as the Society of Automotive Engineers, classified the future of the automobile. A system was developed defining six levels of automated driving from SAE Level Zero (no automation) to SAE Level 5 (full vehicle autonomy). It has since become one of the most…