Search for content, post, videos

Tag

Cybersecurity

cybersecurity-practices-data
0 COMMENT
4479 Views
The Use of National Cybersecurity Practices for Building Proper Cybersecurity Management Programs | The Case of Estonia

Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…

Marriott-cyber-attack-breach-security
0 COMMENT
3987 Views
Marriott’s’ 500 Million Data Breach Scandal

A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…

catch-wave-jobs-of-the-future
0 COMMENT
4573 Views
Catch the Wave: What are the Jobs of the Future?

We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…

cybersecurity-safe-online-attacks-threats
0 COMMENT
3372 Views
Make it a Habit! 10 Ways to Keep You Safe Online

It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it. – Stéphane Nappo Global CISO at Société Générale International Banking 2017 has reminded us once again that security threats are getting more sophisticated, unexpected, and attackers are working harder to discover new vulnerabilities. From…

0 COMMENT
5790 Views
Cybercrime – Main challenges faced

The increasing nature of cybercrime Application services in the cyberspace have gained a huge importance in our lives expanding beyond the business-to-consumers and consumer-to-consumer models to a form of many-to-many interactions and transactions, called the Internet of Everything (IoE), predicting that by 2020 there will be more than 200 billion…

Harvey Berger-Picture1- State-Property-Breaches
0 COMMENT
4305 Views
Legal Documents and State Property Protection

In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…

Cyber Attacks
0 COMMENT
4423 Views
Social Engineering and Risk from Cyber-Attacks

Today, many people are facing the risk of losing information and sensitive data. For criminals/hackers, social engineering is one of the most prolific and effective means to induce people to carry out specific actions or to divulge information that can be useful for attackers. This article will discuss the basics…