Articles

5 popular cloud myths – are they true?

134 09.05.2019

The cloud is well established as a major force in the world of IT. Companies of all sizes and industries are starting to use cloud services a lot more. Yet, there are still some questions and worries ...

DDoS attacks – types and variations

214 02.04.2019

We have already talked about DDoS attacks. They are a modern plague terrorizing the Internet. Throughout the years they have become stronger and more frequent. The variety of DDoS attacks has increase ...

Hack-proof your devices and stay safe

169 26.03.2019

There is plenty of malware out there created to harm you. They get into your device through a simple click on a link or through the installation of a seemingly harmless application. You can lose sensi ...

Will the new WebAuthn standard replace the classic passwords?

130 21.03.2019

Despite all of the technological advancements, passwords remain the most popular way for people to secure and log into their various profiles and services. However, the classic passwords are often the ...

What stood out during the Mobile World Congress 2019?

170 14.03.2019

This year’s Mobile World Congress in Barcelona looked a bit more thrilling than before. One of the main reasons for this is that finally there were some new trends and technologies coming into reality ...

5 major security risks in 2019

135 28.02.2019

2019 is well underway and cybersecurity is once again in the minds of experts and organizations. The good news – this is no longer a distant topic, but instead companies are now actively working on im ...