Quick pick

NIS2

NIS2

11 posts
ISO 27001

ISO 27001

19 posts
AI & ML

AI & ML

7 posts
SSDLC

SSDLC

14 posts
General

Avira PC Cleaner – a second opinion scanner

The PC Cleaner is a scanner which can be used in parallel with other antimalware products. It is created for users of other security products that think that they might have a malware infection which their security solution doesn’t detect. It works on any PC, note- or netbooks with operating system Windows XP SP3 and above. It […]

improve-your-security

IT Security Myths on Improve-Your-Security.org

You surely know of my free eBook “Improve Your Security” available here. I started to publish there a series of IT Security myths which will make you say “Oh, SHIT!!!”   Here they are: http://improve-your-security.org/category/myths/ These are the first three: Most victims of malware often think, “This can never happen to me. Our network is secure, […]

Uncategorized

Information security in the Social Media age

A company doesn’t exist anymore if it is not present on at least a few social media platforms. Depending on the area they are active, they could go for average consumer or for highly skilled professionals. In order to address their customers, they need to use one or another social media platform. However, the tendency […]

published-external quoted

Three key security threats seen during 2013 – and how to protect against them

Originally published here: http://grahamcluley.com/2013/12/three-key-security-threats/ 1. Security breaches and hacks   2013 was the year that major security breaches and hacks really took hold. Millions of credentials were stolen from the likes of Twitter, Tumblr,Yahoo, Adobe and many others. Whenever data breaches like this occur, targeted attacks against the users of such wesbites can quickly follow. The targeted attacks usually consist […]

improve-your-security

Improve your security: Securing your notebook

Quite a lot of people take now their netbook or smartphone with them when travelling. Because of this, almost every quarter of the year we read stories about sensitive personal data was lost because some laptop or USB stick got stolen. Moreover, with the rise of the mobile devices like smartphones, tablets and pads, anyone […]