This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Articles

Computer Security Feature Essays

Tess Saunier
Tess Saunier
Tess Saunier's Blog

Nation State Cybersecurity Threats

One of the most significant nation-state cybersecurity threats is advanced persistent threats (APTs). APTs are long-term, targeted attacks that are often carried out by nation-states or state-sponsored hacking groups.

Ransomware Protection Playbook by Roger Grimes

"Ransomware Protection Playbook" by Roger Grimes is a comprehensive guide to protecting against one of the most persistent and devastating threats to businesses and individuals in the digital age: ransomware.

Book Review: The Art of Invincibility by Kevin Mitnick

The Art of Invincibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data is a book written by Kevin Mitnick, one of the most famous hackers of all time, who turned into a security consultant.

Top Twenty Most Influential People in Cybersecurity

Cybersecurity is a rapidly growing field that is vital for the protection of individuals, organizations, and governments from digital threats.

A History of Cryptography

Cryptography is the practice of securing information through the use of codes and ciphers.

What it Takes to Be a Successful CISO

Being a successful Chief Information Security Officer (CISO) requires a combination of technical knowledge, leadership skills, and business acumen.

The Importance of Security Awareness Training

One of the key virtues of security awareness training is that it helps to change employee behavior. Many security incidents occur as a result of human error, such as falling for phishing scams or using weak passwords.

Amazon AWS Security Services

Amazon Web Services (AWS) is a cloud computing platform that provides a wide range of services, including storage, computing power, and databases.

Do you wish to contribute a technical article on cybersecurity? If so, you'll get your own blog category on our site and your posts may be shared across our IT Specialist Network platform including social networks. Click to read the guidelines.