Blog

  • Viruses, worms, and trojans

      1. Malware End devices such as computers, phones, tablets, and printers are particularly vulnerable to malware attacks. Therefore, this topic focuses on threats to end devices.Malware is short for malicious software or malicious code. It is code or software designed to damage, disrupt, steal, or inflict other “bad” or illegitimate actions on data, hosts, or networks.It is…

  • What kind of hacker are you?

    The difference between them What is a hacker? The term ‘hacker’ does not necessarily have a negative connotation. For the original generation of hackers, it represented a blend of technical expertise, curiosity, and kindness. A hacker is an individual who uses a computer, networking, or other skills to overcome a technical problem. Over the years,…

  • EU Dora & How to be Compliant

    This is how to comply with the new EU regulation. Digital Operational Resilience Act  The Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and will apply as of 17 January 2025. Who Does DORA Apply To? DORA applies to Europe’s 22,000 financial entities and the ICT…

  • Google’s Quantum AI – $5 mill project

    This is What Happened.   Quantum computers use quantum physics to access computational abilities that are different from classical computers. Google Quantum AI is exploring potential applications for cleaner fertilization, more efficient batteries, pharmaceutical discoveries, and more. Quantum computers can perform tasks no classical computer can. Classical computers have enabled some of humanity’s most outstanding…

  • Objectives of Cyber Threat Intelligence

    A quick Google search for an answer will return many variations. Some will make sense to you, and some will not.

    Cyber threat intelligence (CTI) is gathering information from various sources about current or potential threats to an organization. That’s a simple and short definition for now, you would think.

    I will explore this question in more detail in this article and hope to help you better understand and define it.

    What is Cyber Threat Intelligence (CTI)?
    Most of the people you meet will not know what CTI is, and that’s because, unfortunately, there is no single answer. In other words, CTI means many different things to many different people. Some would define it as a “Data Feed of Indicators of Compromise (IOC).” Some would say that CTI is a systematic analysis structure of the threat.

  • Backing up your data

    Jepp, you are correct. A quick Google search for your data backup will give you 49 million results. You will then wonder why I would write an article on Medium. I am creating this guide to simplify technical terminology, making it accessible to everyone. Whether using Windows or MacOS, you can easily understand how to…