Blog
Guide of Cybersecurity: how to choose a reliable service to keep your data safe
Choosing a cybersecurity provider you can trust is the first step to securing your data. Here are a few tips to help you in the process.
What do I need to become a cybersecurity professional?
The opportunities in the tech ecosystem are immense, from product management to back-end development. Check it out.
The best conferences of 2022 so far: our takes on the latest cybersecurity events
From RSA to InfoSecurity Europe, the past few months were full of fantastic tech and cryptography events.
Here is why we need more diversity programs in cybersecurity
Diverse companies are stronger, with broader skills, and brew more innovation - all absolutely necessary for cybersecurity.
Metaverse x Cybersecurity: how to protect yourself inside the metaverse
The Metaverse will bring us - quite literally - a whole new world with different possibilities and many challenges.
What are JSON Web Tokens (JWTs), and how do they work?
As cybersecurity experts search for new ways to increase privacy online, JWTs have become one of the most potent authentication tools.
What is the BlackCat ransomware attack, and why is it unique?
The so-called BlackCat ransomware has drawn the attention of cyber experts. Here's what you need to know about it.
The importance of breaking gender bias in cybersecurity
Cybersecurity is a field where more talent is needed; bringing more women (and diversity) to teams is the only way forward.
How lack of investments created a huge debt in cybersecurity
As companies prioritised operations in the last few months, security investments need to increase to compensate for that debt.
What is the difference between encryption, tokenisation, and masking?
There are many ways to protect data. Here's our take on the tools that can (and should) be used to complement each other.
ASM: what is it, where to use it, and how can it prevent cyber attacks?
Here's how Attack Surface Management (ASM helps organisations identify and monitor possible threats.
What are the differences between encryption, salting and hashing?
These security techniques have different applications but work together to get higher levels of data protection.
War in the 2020s: how it can all start with cyberattacks
Before the Russian tanks rolled into Ukraine, the country was first attacked by malware. Intelligence flows in many ways in times of war.