2019 The Year of Cyber Crime

The major cyber crimes from ransomware attacks, Supply chain hacks and evolving tensions with Iran. Since the beginning of 2019, there were news about data breaches, supply chain manipulations, state-breached hacking campaigns and harbingers of cyber war. It seems like the worst is yet to come on 2019. We all are quite familiar with the…

READ MORE
">

Thoughts

Hand-picked posts on the latest business and tech topics from our experts.

2019 The Year of Cyber Crime

The major cyber crimes from ransomware attacks, Supply chain hacks and evolving tensions with Iran. Since the beginning of 2019, there were news about data breaches, supply chain manipulations, state-breached hacking campaigns and harbingers of cyber war. It seems like the worst is yet to come on 2019. We all are quite familiar with the…

A beginner’s guide to Blockchain

The Blockchain is an ingenious invention by a person or group of people known by the pseudonym, Satoshi Nakamoto. But since then, it has evolved into something greater, and the main question every single person is asking is: What is Blockchain? By allowing digital information to be distributed but not copied, blockchain technology created the…

A guide to onboard Security Information and Event Management in your Organization

If your business is like most, you are collecting logs from almost every device with security relevance. The flood of events is probably more than any human can alone correlate. This is the role of the Security Information & Event Management (SIEM) system.

A Spin around the Space

“Apparently, there is a car in orbit around the earth”, this tweet by Elon Musk, the CEO of SpaceX, has set the whole world in a state of awe as the Florida Space Coast witnessed the marvellous launch of Tesla Roadster with the Falcon Heavy rocket, the most powerful rocket in the world. The Tesla…

About CodeTwo Email Signatures for Office 365

CodeTwo Email Signatures for Office 365 is an email signature management solution which allows your company to keep consistent branding in email communication. Thanks to this tool, you can enjoy automatic, professional email signatures and disclaimers regardless of the email client or device used. MS Office 365 message protection and CodeTwo It is an era…

Add and Manage photos in Outlook messages and contacts FOR FREE!

Have you ever met someone after a long email conversation or a Lync or Skype chat and not recognized the person until they confront you with their name? Well, how good is your email signature in Outlook? Do you have to be a Microsoft Exchange expert to customise your information and add photos to your…

Cybersecurity Thoughts

Discover our latest thinking on cybersecurity, threat intelligence and related careers.

A guide to onboard Security Information and Event Management in your Organization

If your business is like most, you are collecting logs from almost every device with security relevance. The flood of events is probably more than any human can alone correlate. This is the role of the Security Information & Event Management (SIEM) system.

Digitalization without Cyber Security

In October 2018, Siemens founded a global cyber security Organization which was under the leadership of Natalia Oropeza. It protects IT, OT and all the products based of Siemens.

The story of university data attacks

It is very shocking to know that the cyber criminals have not spared the education sectors from their target zone.

When Protection Fails, Forensics can still win the game

The business is being disrupted by artificial intelligence (AI), security orchestration, and the Internet of Things. Many analysts also foresee an environment where computers and IoT devices replace robots for employees. Nevertheless, most futurists believe that technology will only grow to a virtual assistant’s level. Tasks will be split between artificial intelligence and human intelligence,…

Drones are capable to capture your communications!

Drones Communications Protecting high classified data’s have become one of the biggest challenges for Organizations around the world, Particularly in the digitization era. Critical IT assets remain extremely vulnerable as data-thefts are rising. Your vital information stored on various servers is the most yearned ‘commodity’ in cyberspace. Even if the slightest of the data are…

2019 The Year of Cyber Crime

The major cyber crimes from ransomware attacks, Supply chain hacks and evolving tensions with Iran. Since the beginning of 2019, there were news about data breaches, supply chain manipulations, state-breached hacking campaigns and harbingers of cyber war. It seems like the worst is yet to come on 2019. We all are quite familiar with the…

Subscription center
Stay in the Know with Our Newsletter Stay in the Know with Our Newsletter