Skip to content
CloudSEK
  • Products
    • XVigil
  • Solutions
    • Cyber Threats Monitor
      • Dark web Monitoring
    • Brand Monitor
    • Infrastructure Monitor
  • Customers
    • Customer Stories
  • Resources
    • Blog
    • Opinions
    • Threat Intelligence
    • Webinars
    • Whitepapers, Reports & Guides
    • Cyber Bulletin
  • About Us
    • Our Story
    • The Team
    • Careers
    • In the News
    • Announcement
  • Login
  • Request a Demo

Category: Security

[Quiz] Weekly Cyber Trivia Quiz Contest #4

Posted on September 8, 2020 | by Sahil Amanu | Leave a Comment on [Quiz] Weekly Cyber Trivia Quiz Contest #4

Cyber Trivia Quiz is here! Find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some…

Posted in Security | Tagged Opinions

Why you should be worried about a cyber pandemic that could take over the cyberspace

Posted on September 8, 2020 | by Anandeshwar Unnikrishnan | Leave a Comment on Why you should be worried about a cyber pandemic that could take over the cyberspace

This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.

Posted in DDoS, Ransomware, Security | Tagged Opinions

Worst cybersecurity strategies and how we can overcome them

Posted on September 2, 2020 | by Janet Jose | Leave a Comment on Worst cybersecurity strategies and how we can overcome them

A list of the worst cybersecurity practices and strategies that could be detrimental to your organizations and alternate solutions.

Posted in Security | Tagged Opinions

How to build a secure AWS infrastructure

Posted on August 28, 2020 | by Syed Shahrukh Ahmed

Summary of the recommendations of AWS’ Well-Architected Framework, with respect to design, delivery, and maintenance of secure AWS workloads.

Posted in Breach, Cloud services, Data leaks, Security | Tagged Research

Why monitoring the most popular P2P messenger should be a cybersecurity priority

Posted on August 18, 2020 | by Prerit Prasad | Leave a Comment on Why monitoring the most popular P2P messenger should be a cybersecurity priority

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.

Posted in Security, Vulnerability | Tagged Opinions

How much does a data breach cost you?

Posted on August 14, 2020 | by Deepanjli Paulraj | Leave a Comment on How much does a data breach cost you?

Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s cyber security posture.

Posted in Breach, Security | Tagged Opinions

[Quiz] Weekly Cyber Trivia Quiz Contest #3

Posted on August 13, 2020 | by Sahil Amanu | Leave a Comment on [Quiz] Weekly Cyber Trivia Quiz Contest #3

Cyber Trivia Quiz is here! Find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some…

Posted in Security

[Quiz] Weekly Cyber Trivia Friday #2

Posted on July 31, 2020 | by Sahil Amanu | Leave a Comment on [Quiz] Weekly Cyber Trivia Friday #2

Cyber Trivia Friday is here! Find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some…

Posted in Security

What makes Android apps vulnerable to cyberattacks?

Posted on July 30, 2020 | by Palash | Leave a Comment on What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that users and developers commonly encounter.

Posted in Security, Vulnerability

Want to deter threat actors? Start by nullifying your data leaks.

Posted on July 23, 2020 | by Deepanjli Paulraj | Leave a Comment on Want to deter threat actors? Start by nullifying your data leaks.

Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are ways to prevent data leaks.

Posted in Breach, Data leaks, Security | Tagged Opinions

Posts navigation

Older posts
Newer posts
  • Recent
  • Comments

Categories

  • Achievements
  • Advisory
  • Adware
  • APT
  • Artificial Intelligence
  • Awards
  • Banking Trojan
  • Botnet
  • Brand Monitoring
  • Breach
  • Career
  • Cloud
  • Cloud services
  • COVID
  • Cryptomining
  • Cybersecurity
  • Dark Web
  • Data leaks
  • DDoS
  • Digital assets
  • Engineering
  • Espionage
  • Events
  • Hacking
  • Hiring
  • Infrastructure Engineering
  • Integration
  • Local Privilege Escalation
  • Machine Learning
  • Malware
  • Phishing
  • Product Management
  • Programming
  • RaaS
  • Ransomware
  • RAT
  • RCE
  • Scam
  • Security
  • Smishing
  • Social Engineering
  • Spear phishing
  • Threat Intelligence
  • Trojan
  • UI/UX
  • Vulnerability
  • Zero-day

CloudSEK - Logo for dark backgrounds
Products
  • XVigil
Solutions
  • Cyber Threats Monitor
  • Brand Monitor
  • Infrastructure Monitor
About Us
  • The Team
  • In the news
  • Announcement
  • Customer Stories
  • Privacy
  • Security
  • GDPR
Careers
  • Careers
  • Jobs
  • Life at CloudSEK
Resources
  • Blogs
  • Opinions
  • Webinars
  • Whitepapers, Reports & Guides
  • Threat Intelligence
  • Cyber Bulletin
Events
  • Media Kit

Copyright © 2020 CloudSEK