Information security that is not based only on standards and checklists but also on risk-based prioritization, business needs, hands-on cyber security experience and a philosophy to always look at things from attacker’s perspective.
Create a Network Security Policy for your company. Overview of important aspects and tips on developing enforceable security policy
This post intends to provide information about the enforcement of cyber laws; it reviews laws and international treaties relating to cybercrime and provides a comparative analysis of legislations of several countries.
The best way to keep cryptoassets secure is by utilizing official wallet software. It is recommended not to trust third party providers and exchanges with your cryptocurrencies. In this short guide we will go through a Monero wallet installation and configuration.
Monero is an actively developed private and secure cryptocurrency with a strong support from community. Interesting features guarantee anonymity, fungibility and privacy by default.
Meltdown and Spectre are two major vulnerabilities in modern processors, undermining layers of security features introduced by applications on your system, resulting in leakage of any data in clear form (encrypted/not encrypted).
Censorship, halal network, privacy intrusions and cyber army. A look into the Persian cyberspace.
While cryptocurrencies become popular, cyber criminals, authorities and media turn their attention to it. Here are the top threats to cryptocurrencies in 2018