Nikoloz discusses the latest Reddit data breach and how this social media gem has communicated the incident with to over 300 million users. Stay tuned for the experience!
Nikoloz talks about a Data Leak Prevention strategy. The podcast will be about development of the strategy, key points to focus on and the main features that you would want to your DLP to have.
Analysis of recent incident at Apple, when an employee tried to sabotage a tech giant by leaking highly confidential data about autonomous vehicle project to Chinese company. Let's see what we can learn from Apple’s experience and how we can reduce the risk of insider threats in our organizations.
50 types of data that Facebook is collecting from you. The wrong practices Facebook has been conducting since its foundation and how these activities affect privacy of 2.2 billion people around the globe.
Tune in to understand what really happened with Ticketmaster databreach as Nikoloz looks at this event from a different perspective, provides insights and shares lessons-learned.
Let's start with Flightradar24 Data Breach and see how they responded to the incident, next we will have a deeper look at iPhone passcode bypass and see if you should really be worried about it, last but not least let's see how much of your data can smartphone batteries leak.
The very first episode of CypherOwl Security Experience. Nikoloz reviews new phishing AI research, an AI that allegedly generates phishing URLs and beats modern defense mechanisms.
Almost every company is afraid of a major cyber-attack, yet most of them fail to properly manage vulnerabilities. Let's dive deeper into main causes behind open vulnerabilities and find a workaround
There are times when we are overwhelmed trying to tackle multiple problems or a number of tasks simultaneously. In order to make proper decisions it's crucial to maintain stability, relax and prioritize issues. Next, you can follow these steps for tackling multiple problems in organized manner
Information security is about leadership, procedures, people, risks, defense, assets and vulnerabilities
Here are suggestions for crafting simple, understandable and result oriented information security & risk assessment questionnaires.
There are many ways to manage risks and each one of them should fit business needs of organization. Here is one way to manage risks around assets.