Quantum supremacy is almost uncertainly here
Credit to Author: Sergey Lurye| Date: Tue, 24 Sep 2019 12:01:05 +0000
According to recent news, quantum supremacy is reached. What should we do about it?
Read moreCredit to Author: Sergey Lurye| Date: Tue, 24 Sep 2019 12:01:05 +0000
According to recent news, quantum supremacy is reached. What should we do about it?
Read moreCredit to Author: Leonid Grustniy| Date: Wed, 16 Jan 2019 19:24:01 +0000
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
Read moreCredit to Author: Trend Micro| Date: Mon, 05 Nov 2018 15:00:50 +0000
One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…
The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .
Read moreCredit to Author: Nikolay Pankov| Date: Wed, 12 Sep 2018 11:00:11 +0000
How businesses globally handle personally identifiable information.
Read moreCredit to Author: Nikolay Pankov| Date: Thu, 02 Aug 2018 11:54:32 +0000
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Read moreCredit to Author: Windows Defender ATP| Date: Tue, 05 Jun 2018 16:00:15 +0000
The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote code execution capability, resulting in widescale global outbreaks. Windows 10 remained resilient to these attacks,
Read moreCredit to Author: Oleg Gorobets| Date: Wed, 23 May 2018 19:10:57 +0000
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 18 May 2018 15:11:27 +0000
A small infographic to remind you what GDPR is and what businesses can do to boost personal data security.
Read more