The cybersecurity industry has seen rapid growth in 2020, paving the way for a number of successful startups. Find out which cybersecurity companies are the ones to watch in 2021.
Clickjacking or UI redress attacks are extremely prevalent today. In this post we look at what clickjacking is, how it works, and how you can protect yourself.
Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
Considering a role as a computer forensics analyst? We reveal everything you need to know about what this role entails and how to get started in your career.
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
Cybersecurity job growth is exploding so if you've always wanted to work in cybersecurity, now is the time to start looking. Explore the market, learn who's hiring, and determine the path you need to land your first cybersecurity job.
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.