Stay on op - Ge the daily news in your inbox
Latest Articles
Instructions
Be aware of the mail attack methods in 2021
The mail security researchers from NoSpamProxy publish a forecast on the most important malware attacks on mail networks in 2021 and call for more...
Developer
Solutions for better data protection in an S3 bucket
The usage of AWS S3 bucket is growing exponentially. The driver of this growth is the sharing of files by employees. Another reason is...
Developer
Successful malware prevention is behavior based
Many companies use measures to detect fraud that are now outdated and do not work properly. This includes, for example, the search for malware...
Instructions
Advices for smart device owners to protect password attacks
According to the Avira research team, 35 % of all hacker attacks on the access of smart device take place with empty input fields....
Business
Trends that will shape the IT security and the way we work in 2021
Many trends that we already encountered in the previous year- including collaboration and apps for employees as well as increased awareness of IT security...
Business
Cloud software continues to protect companies from cyber attacks
If you think your company is too small and therefore not a worthwhile target for cyber attackers, you are wrong. Because not only large...
Business
AIOps for networks is emerging
Hardly any other sector is as fast-moving as the technology - new developments and methods are constantly emerging. A key innovation that has made...
Business
More protective measures for the Industry 4.0
Cyber attackers are increasingly focused on targets in every sector. If they succeed in smuggling malware into networks, they can switch off safety data...
Developer
Cyber threats: Keeping one step ahead of hackers
If you consider the cybersecurity threats situation, the increase of hacker attacks on companies of successful hacks, cyber attackers always seem to be one...
Instructions
Steps to secure your password from hackers
What to secure your password? Change regularly or do you prefer to play it safe? How long it would take a computer to secure...
Developer
Corona pandemic in relation to OT security
Companies were required to review their business and get used to the fact that in the near future fewer employees would be working from...
Developer
6 Ways of detecting attacks using device IDs
Every mobile device has a unique identification. This device ID can be used for various purposes. Websites can use it to track and check...