Top of Site Ad
Home Cyber Security

Cyber Security

    EndaceProbe Release Changes the Game for Network Forensics

    The latest software from Endace extends support for threat hunting and security incident response with easy file reconstruction, log generation, and multi-tenant support Packet capture authority, Endace, today announced...

    BT to utilize ‘epidemiological AI’ based on the spread of viruses between humans to...

      BT today announced that it has developed an epidemiology-based cybersecurity prototype, "Inflame," that uses Deep Reinforcement Learning to enable organizations to automatically detect and respond to cyberattacks...

    How Is It Possible to Control the Devices of an Employee Working Remotely?

      Due to the current pandemic situation, it seems like we are stuck with working remotely for quite a long time. However, there are also employees who are...

    How to Find Out If Someone Is Using Your SSN Number

      Here in the United States, your Social Security Number (SSN) is a very powerful piece of information. It’s basically your identity in the system and according to...

    How To Protect Your Private Computer From Hackers: Basics To Know

      Cybercrime has shown that it is not going away soon, with hackers finding new ways to introduce malware and crumble organizations’ security. If your private cybersecurity is...

    #TCE2021 Meet the Speakers: Security and Privacy in Artificial Intelligence, Virtual and Mixed Reality

    #TCE2021CEE #TCE2021Spring The Spring Edition of TECH Conference Europe will take place on the 16th March and is part of #HiptherFestival. The event gathers developers, CEOs, managers and compliance experts from...

    4 Ways to Protect Your Data from a Ransomware Attack

      Hadn't it been for technology, the world would have been a completely different place. If you talk to any business owner out there, you will come across...

    What is GDPR and how does it affect  software companies? 

    GDPR is an EU data privacy law that went into effect on May 25, 2018. It’s designed to give individuals more control over how their data is...

    Report: Popular Digital Wallet Exposes Millions to Risk in Huge Data Leak

      Led by Noam Rotem and Ran Locar, vpnMentor’s research team recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14...

    Different Forms of Malware

      Malware is malicious software designed to enable unauthorized access or cause damage to systems or networks. Malware statistics show that it has become a sweeping problem across...

    Recent Posts

    Please turn AdBlock off