Reducing the complexity of security tasks with the involvement of AI

Practical design considerations implemented in key functionalities of cybersecurity solutions can go a long way toward increasing the impact of in-house security, while also reducing the sometimes-necessary complexity of their use. However, processing actionable data, be it detections or threat intelligence, is also complex and takes considerable capacity, manpower, and maturity. At the same time, … More Reducing the complexity of security tasks with the involvement of AI

The hacker’s toolkit: 4 gadgets that could spell security trouble

Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands? Can seemingly innocuous objects that feign the appearance of regular USB sticks, charging cables or children’s toys be co-opted as tools to aid and abet … More The hacker’s toolkit: 4 gadgets that could spell security trouble

Adding insult to injury: crypto recovery scams

Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over. It’s a nightmare scenario for any cryptocurrency user. You fall victim to a crypto scam or cyberattack, resulting in stolen funds. You feel regret … More Adding insult to injury: crypto recovery scams

“Mum, I’m ready!” When should you get your child their first smartphone?

These days, our kids have watched us use smart devices ever since they were born – and maybe they even joined in occasionally. So it’s no wonder our children will eventually want one. How can parents determine whether their child is ready for this big step? We asked child psychologist Jarmila Tomkova for the answer. … More “Mum, I’m ready!” When should you get your child their first smartphone?

Leveling the playing field for all with MDR

One thing that every company, from the smallest business to the largest enterprise, has in common is that all of them face a world of evolving threats that periodically come knocking on their doorsteps. To counter these threats early on, small and medium-sized businesses (SMBs) are looking to spice up their security postures, while enterprises find that … More Leveling the playing field for all with MDR