Category: CyberDefenseMagazine
Abstract: In this paper, the forward selection (FS) algorithm is introduced on the basis of information and communication technology, and…
By Danijela Obradovic, Lawyer at Roberts & Obradovic “Privacy by Design,” a concept first introduced by former Ontario Information and…
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies Here’s a quick-fire question: do you know where…
Baselining your security by adopting a standard such as Cyber Essentials, Cyber Essentials Plus or the ISO 27001 standard can…
Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase…
By Gregory Hoffer, CEO, Coviant Software Everyone knows someone who is a vintage car nut. They keep their baby in…
Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…
By Christoph Nagy, CEO of SecurityBridge To detect attacks on SAP, you need to evaluate the security logs in SAP….
The need for the cybersecurity industry to work together in order to combat the rising threat of cybercrime. By Brendan…
By Filipe Beato, Cyber Resilience Lead at the World Economic Forum`s Centre for Cybersecurity and Natasa Perucica, Research and Analysis…
By Christoph Nagy, CEO of SecurityBridge It must have been a few years ago that I participated in a webinar…
It cannot have escaped you that the word trustworthy has been added to the cybersecurity lexicon in recent years: trustworthy…










