Home Markets Defense & Cyber Security

Defense & Cyber Security

Let’s find out how robotics and artificial intelligence transform cyber security and defense.

ransomware

The recent history of ransomware attacks

0
The story of ransomware is the story of discovery, professionalization, and growth of the targeted attack extortion model. Before 2016 saw a significant increase...
security

How to evaluate a managed security service provider (MSSP)

0
In today’s digitalized world, companies of all types and sizes need to protect their critical data assets against breaches and intrusions. Unfortunately, most don’t...
security-attacks

Benefits of managed security service providers (MSSP)

0
When delegating information security responsibilities and operations, outsourcing specific managed security services (MSS) through a partnership with a managed security service provider (MSSP) is...
MSSP

Managed security service provider (MSSP) vs. managed service provider (MSP)

0
Businesses are increasingly dependent on third-party service providers for mission-critical services. This may include services related to managed IT services, SaaS, finance and accounting,...
cyber insurance

What should your cyber insurance policy cover?

0
Cyber insurance is an emerging class of insurance products designed to mitigate losses from various cyber incidents, including data breaches, business interruptions, and network...
cyber-insurance

Cyber insurance coverage against ransomware attacks

0
Complex cyber attacks, including ransomware, make it difficult for victims to respond alone — often requiring specific technical and legal experts, including third-party experts,...
outsourcing

Outsourcing your cyber security – 4 choices for companies

0
The cyber security posture of your company depends on your choice of efficient security and risk management solutions to defend your IT infrastructure from...
security

Zero trust architecture: 4 reasons why you need it

0
The Zero Trust approach to cloud and mobile security holds that no user or application should be trusted by default. The least-privileged access principle,...
QR code

QR code security risks – Best practices to mitigate vulnerabilities

0
QR (quick response) codes are two-dimensional barcodes that can encode various kinds of data. A growing number of fields of application are using QR...
database

Top open-source vulnerability databases to trace security issues

0
The Common Vulnerabilities and Exposures (CVE) system is a popular reference system used to catalog disclosed vulnerabilities and exploits. This dictionary of publicly known cybersecurity...