Critical Infrastructure: Protecting Health Service Data
There are few sectors where privacy is as essential as it is in healthcare. People's health and personal information should [...]
Blogs
There are few sectors where privacy is as essential as it is in healthcare. People's health and personal information should [...]
In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and individuals alike. RaaS is a [...]
by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the BSI demands, among other things, [...]
by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 comes into force in May 2023. With the IT [...]
When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in the financial sector must be [...]
By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP (Managed Security Service Provider) clients [...]
By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your defenses to detect evasion and [...]
By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation and mitigation best practicesFinal thoughtsTL;DRA [...]
You may have noticed that, over the last two years, it seems that cyberattacks are on a steep rise. If [...]
Emails house a treasure trove of data, but what kind of data do they contain? How can it be targeted? [...]