facebook_pixel

Day: November 24, 2020

Recent slew of ransomeware attackers raises prominence of cyber security

Recent slew of ransomeware attackers raises prominence of cyber security

A slew of ransomware attacks in recent months have brought the issue to greater prominence and raised justifiable alarm. While data theft and conventional hacking are alarming enough, ransomware attacks entail affected users being locked out of their systems until a demanded fee is paid; there is, of course, no guarantee that access will be …

Recent slew of ransomeware attackers raises prominence of cyber security Read More »

The woes of the F-35

The woes of the F-35

The F-35 jet is most expensive and advanced combat aircraft in history, integrating conventional weapons systems with modern technologies in an unprecedented fashion. The plane has been touted as an example of the future of military aircraft design, with over 8.2 million lines of software as part of its composition. As a multirole aircraft able …

The woes of the F-35 Read More »

Huawei and the West

Huawei and the West

Cyber attacks and espionage officially sanctioned by the Chinese government have become a matter of national security for a number of Western nations in recent years, but issues with Huawei’s expansion – particularly its 5G mobile networks – have shown that Beijing’s private sector is also potentially a risk factor. This is not simply due …

Huawei and the West Read More »

Cryptojacking: What it is and how to protect yourself

Cryptojacking: What it is and how to protect yourself

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Cryptocurrency is simply a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds operating independently of central bank. It is a digital asset that has been created to work as …

Cryptojacking: What it is and how to protect yourself Read More »

8 Ways App Development Companies Can Improve Cyber Security Processes

8 Ways App Development Companies Can Improve Cyber Security Processes

The cyber world is evolving, and so is cybercrime. In 2016, Ponemon Institute established that the average cost of losing sensitive corporate or personal information is approximately $ 4 billion. The FBI reports that more than 4,000 ransomware attacks occur daily, while other research sources state 230,000 new malware samples are produced every day. In …

8 Ways App Development Companies Can Improve Cyber Security Processes Read More »

Qualities of a Good Chief Information Security Officer

Qualities of a Good Chief Information Security Officer

Information security is typically the practice of preventing unauthorized disclosure, modification, access, use, disruption, inspection, and recording of information. The information can be electric or physical.Information security is built mainly around the following three objectives: confidentiality, availability, and integrity. Confidentiality means the information can’t be disclosed to unauthorized entities, process or individuals. Integrity maintains completeness …

Qualities of a Good Chief Information Security Officer Read More »