
Vulnerability management as an integral part of cybersecurity
The continuous vulnerability management process is included in the list of CIS recommendations and is an integral part of cybersecurity and network security. It is the responsibility of organizations to regularly collect, evaluate information regardi...

What is information security vulnerability and how to fix it?
The database of information security vulnerabilities has grown significantly in recent years. This in turn creates a huge potential for attackers and hackers. Any vulnerability can become a way to implement a successful cyberattack. However, many com...

Cloud data leak
A cloud data leak is a situation in which sensitive data stored in a private cloud is accidentally leaked onto the Internet. A mistake simplicity is incommensurable with consequences scale. There are many benefits to using the cloud or partnering wi...
Recent posts
The Rumsfeld Matrix as an effective tool in the decision-making process
During a briefing on the Iraq War, Donald Rumsfeld divided information into 4 categories: known known, known unknown, unknown known, unknown unknown. ...
AI and ML impact on Data Science
Artificial Intelligence and Machine Learning have contributed to the advancement of data science. These technologies help data scientists conduct anal...
Artificial Intelligence for data analytics
Artificial Intelligence is widely used in many applications, including for data analytics. AI is used to analyze large data sets that allows to obtain...