Guide of Cybersecurity: how to choose a reliable service to keep your data safe

Choosing a cybersecurity provider you can trust is the first step to securing your data. Here are a few tips to help you in the process.

July, 05 2022 in Cybersecurity

What do I need to become a cybersecurity professional?

The opportunities in the tech ecosystem are immense, from product management to back-end development. Check it out. 

July, 04 2022 in DevOps

The best conferences of 2022 so far: our takes on the latest cybersecurity events

From RSA to InfoSecurity Europe, the past few months were full of fantastic tech and cryptography events.

July, 04 2022 in Hot Trends

Here is why we need more diversity programs in cybersecurity

Diverse companies are stronger, with broader skills, and brew more innovation - all absolutely necessary for cybersecurity.

June, 24 2022 in Cybersecurity

Metaverse x Cybersecurity: how to protect yourself inside the metaverse

The Metaverse will bring us - quite literally - a whole new world with different possibilities and many challenges.

June, 15 2022 in Hot Trends

What are JSON Web Tokens (JWTs), and how do they work?

As cybersecurity experts search for new ways to increase privacy online, JWTs have become one of the most potent authentication tools.

June, 14 2022 in DevOps

What is the BlackCat ransomware attack, and why is it unique?

The so-called BlackCat ransomware has drawn the attention of cyber experts. Here's what you need to know about it.

May, 23 2022 in Cybersecurity

The importance of breaking gender bias in cybersecurity

Cybersecurity is a field where more talent is needed; bringing more women (and diversity) to teams is the only way forward.

May, 19 2022 in Cybersecurity

How lack of investments created a huge debt in cybersecurity

As companies prioritised operations in the last few months, security investments need to increase to compensate for that debt.

May, 09 2022 in Hot Trends

What is the difference between encryption, tokenisation, and masking?

There are many ways to protect data. Here's our take on the tools that can (and should) be used to complement each other.

April, 25 2022 in Encryption

ASM: what is it, where to use it, and how can it prevent cyber attacks?

Here's how Attack Surface Management (ASM helps organisations identify and monitor possible threats.

April, 11 2022 in Cybersecurity

What are the differences between encryption, salting and hashing?

These security techniques have different applications but work together to get higher levels of data protection.

April, 07 2022 in Encryption

War in the 2020s: how it can all start with cyberattacks

Before the Russian tanks rolled into Ukraine, the country was first attacked by malware. Intelligence flows in many ways in times of war.

March, 17 2022 in Cybersecurity