Sections

Viewpoints

Why COVID-19 will trigger faster, wider adoption of cyber hygiene principles

We have the security tools, frameworks and even regulations to implement robust data security – for companies and consumers

1 May 2020 min read

Why cyber hygiene is crucial to resolving COVID-19

perex__ As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

24 April 2020 min read

The other coronavirus epidemic: cybercrime

perex__ Cybercriminals prey on fear during the COVID-19 for their own gain.

Cybercriminals prey on fear during the COVID-19 for their own gain.

17 April 2020 min read

Authoritarianism goes viral

perex__ In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

7 April 2020 min read

The disclosure of vulnerabilities and the vulnerability of disclosures

perex__ {value=Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable? }

Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

25 March 2020 min read

CEOs quit Tweeting to boost security

perex__ {value=Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment}

Senior leaders see cyber as No. 1 risk; now comes heavy lifting to impose cyber hygiene in a complex environment

5 March 2020 min read

Visit Avast website

Balkanization and globalization: the battle for freedom in the internet

perex__ Nationalism is fueling the isolation of the internet

Nationalism is fueling the isolation of the internet

20 February 2020 min read

Iran’s revenge is already well under way

perex__ Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

Long stretch of reconnaissance, malware plantings position Iran to carry out varied attacks on the U.S. and its allies

29 January 2020 min read

Keeping your part of the IoT safe

perex__ The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

The Internet of Things is vast, complex, and filled with risk – but network security can simplify it

22 January 2020 min read

2020: Rise of the world's elite hackers

perex__ The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

The geopolitical cyberwar between Iran, China, North Korea, Russia and the liberal democracies is about to get very sophisticated

6 January 2020 min read

What you need to know about the CVV numbers on the back of your credit card

perex__ Attention holiday shoppers: The card verification value should never be stored online

Attention holiday shoppers: The card verification value should never be stored online

11 December 2019 min read

What everyone needs to know about the technical foundation of digital privacy

perex__ Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

Efforts are progressing to preserve Public Key Infrastructure and digital certificates at the core of cybersecurity

5 December 2019 min read