What should you do when you get hacked? This post helps you understand how you should prepare and what your action plan should be focused on to minimize business impact and getting back to normal quickly.
A blog post showing how easy it can be to create malware that lets a hacker get access to your computer - whether you are running Windows, Linux or a Mac.
The problem with the "dangerous link" is often not that we do not know that links may be dangerous. Our goal when using a computer is not to verify that links are safe (unless you work in cybersecurity, perhaps) - it is to get something done. Can designers help make that safer?
Italian regulator gives first GDPR fine - over poor cybersecurity practices at the website of the 5-star movement. Good information security management is a requirement for GDPR compliance.
Threat modeling is essential for building a good defense in depth strategy. Integrating threat intelligence and a systematic approach to risk evaluation will help you secure better decisions. Read how Cybehave is working to automate the most difficult parts of threat modeling for you.