• Jul 20
    2018
    The first six (almost seven) months of 2018 have thankfully been a bit quieter in terms of global ransomware attacks and government leaks compared to last year, which is good news. Unfortunately, that’s where the good news stops when it comes to cybersecurity in 2018. In just the first half of this year, we have seen that critical security infrastructure is barely hanging on and state-based hackers are getting more ...
  • Jul 10
    2018
    Unfortunately, there seems to be a misconception that once a cyberattack occurs, there is not much that can be done to fight back against the attackers. This couldn’t be further from the truth. After a data breach or cyberattack descends on your organization, there are thankfully several active defense steps that you can take to minimize the amount of havoc caused by cybercriminals. These steps are focused on detecting attacks ...
  • Jun 26
    2018
    When was the last time you considered reviewing your company’s current cybersecurity strategy and plans? If you haven’t thought about it in a while, chances are that you are probably at risk. In this ever-evolving threat landscape, your organization cannot afford to sit and feel proud or complacent in the fact that your current cybersecurity strategy is good enough. Far too many companies believe that once these plans are made, ...
  • Jun 21
    2018
    Amey Varangaonkar| Packt Publishing One thing that every data professional absolutely dreads is the day their skills are no longer relevant in the market. In an ever-changing tech landscape, one must be constantly on the lookout for the most relevant, industrially-accepted tools and frameworks. This is applicable everywhere – from application and web developers to cybersecurity professionals. Not even the data professionals are excluded from this, as new ways and ...
  • Jun 14
    2018
    The World Cup is a great example of an event that inspires awe, national pride, and excitement in people from countries all over the world. While these events are typically focused on physical security, the need for increased cybersecurity efforts should not be overlooked. If you have traveled to Russia to experience the World Cup in person or are out traveling the world for any other reason, you must not ...
  • Jun 06
    2018
    When the word “hacking” is mentioned in a conversation, people generally have the same image pop into their heads: a glasses-adorned hacker types furiously in front of several computer monitors while analyzing massive amounts of code to steal millions of dollars. He or she then mutters the fateful words of, “I’m in.” Thanks to movies and television shows, many think this is how cyberattacks occur. However, hacking is much less ...
  • May 25
    2018
    James Cronin | Business Development Manager, Packt Publishing People often think of coding as something very specialized and technically demanding. There’s sometimes even a perception that writing code is confined to a specific type of person. But this is, luckily, demonstrably untrue. Writing code is something that can be done by anyone.While there are some incredibly specialized roles that require incredibly detailed levels of programming knowledge, in actuality a huge ...
  • May 24
    2018
    Nearly everything we do and have revolves around data in some form. From social media and shopping online to simply visiting a doctor’s office, our data is being recorded and analyzed in one format or another. Private information, such as full names, addresses, and credit cards, is constantly being collected, tracked, and even saved by companies. As long as this information is valuable, there will be hackers and cybercriminals who ...