At Blockchain Day 2019, which took place on March 21st 2019, industry professionals and enthusiasts from the crypto world met in Lasko’s Thermana Park Hotel, where a number of interesting presentations and discussions took place –
Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk of
Artificial Intelligence, Neural Networks, Cognitive Computing, and Machine Learning are all buzzwords applied to cybersecurity. But what do they actually mean? Are marketing departments simply re-using cognitive science terms to create
By Joakim Thorén, CEO
Just about six months after the implementation of the EU's General Data Protection Regulation, we polled companies both in Europe and beyond to learn how the GDPR is impacting them. Among the most important findings:
While online sales of identity and banking information have both been easily accessible to malicious actors for a decade or more, there has been a recent maturation in the dark web economy focused on tax identity theft.
Carbon Black’s recent
Distributed Denial of Services (DDoS) Overview
Denial of service is a form of cyber-attack in which attackers overload computing or network resources with so much traffic that legitimate users are prevented from accessing to online services
Introduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen techniques of this "fileless" execution is code injection. Rather than
Podjetje REAL security d.o.o. je podpisalo distribucijsko pogodbo za področje Slovenije za zastopanje in posredovanje rešitev podjetja Acronis, vodilnega na področju kibernetske zaščite in hibridnih rešitev v oblaku. Slovenski distributer, ki je
In the spirit of March Madness, we’re evaluating the type of cyberattacks that most concern our community of security experts. When approximately one million cyberattacks are attempted per day, this “madness” takes on a whole new level for
In contrast to the other components of enterprise networks, the wide-area network (WAN) stands out as the most demanding to administer because it often includes a variety of services and devices with most of those devices at unsupported sites.