Click to learn more about author Samuel Bocetta. For as long as there have been computer networks, there has been an ongoing arms race between those striving to keep them private and secure, and those who seek to exploit their weaknesses and use, steal, or leverage their contents for fun or profit. This Spy vs. […]
How to Protect your Enterprise Data Against Social Engineering Attacks
Click to learn more about author Ilan Paretsky. If someone had predicted, a decade or two ago, that knowledge of psychology and human behavior would one day be a key factor in protecting IT systems from cyber criminals, it would have seemed far-fetched. However, it’s very much the reality facing security professionals in 2018. Modern cyber […]