Sections

Viewpoints

What you need to know about email threats

As email threats are increasing in popularity, what can you do to protect your business or personal account from attack?

8 May 2020 min read

Why COVID-19 will trigger faster, wider adoption of cyber hygiene principles

perex__ We have the security tools, frameworks and even regulations to implement robust data security – for companies and consumers

We have the security tools, frameworks and even regulations to implement robust data security – for companies and consumers

1 May 2020 min read

Why cyber hygiene is crucial to resolving COVID-19

perex__ As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

24 April 2020 min read

The other coronavirus epidemic: cybercrime

perex__ Cybercriminals prey on fear during the COVID-19 for their own gain.

Cybercriminals prey on fear during the COVID-19 for their own gain.

17 April 2020 min read

Authoritarianism goes viral

perex__ {value=In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?}

In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

7 April 2020 min read

The disclosure of vulnerabilities and the vulnerability of disclosures

perex__ {value=Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable? }

Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

25 March 2020 min read

Visit Avast website

CEOs quit Tweeting to boost security

perex__ Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment

Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment

5 March 2020 min read

Balkanization and globalization: the battle for freedom in the internet

perex__ Nationalism is fueling the isolation of the internet

Nationalism is fueling the isolation of the internet

20 February 2020 min read

Iran’s revenge is already well under way

perex__ Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

29 January 2020 min read

Keeping your part of the IoT safe

perex__ The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

22 January 2020 min read

2020: Rise of the world's elite hackers

perex__ The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

6 January 2020 min read

What you need to know about the CVV numbers on the back of your credit card

perex__ Attention holiday shoppers: The card verification value should never be stored online

Attention holiday shoppers: The card verification value should never be stored online

11 December 2019 min read