Search Results for: technical challenges Knowledge Center Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... Blog Post Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and... Blog Post Vulnerability Disclosure: Tips for Researchers and Vendors March 26, 2021 Vulnerability disclosure actions is a process whose purpose, principles and importance were presented in our previous article The Underlying Basis... Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,... Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,... Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post The 2020 National Cybersecurity Awareness Month (NCSAM) October 21, 2020 In a year when many businesses have had to move their operations online, the need to protect digital devices has... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT... Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Blog Post Motivations Behind Cyber-Attacks March 4, 2020 Cyber attacks are malicious attacks on computer systems and networks for damaging data or disrupting operations. Common types of cyberattacks...
Knowledge Center Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective...
Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
Blog Post Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and...
Blog Post Vulnerability Disclosure: Tips for Researchers and Vendors March 26, 2021 Vulnerability disclosure actions is a process whose purpose, principles and importance were presented in our previous article The Underlying Basis...
Blog Post Security Events During Summer August 16, 2021 Cybersecurity and related events continue into the summer period. Organizations working in this field are also now offering several events,...
Blog Post LIFARS’ GARGAMEL Selected as SC Media 2021 Trust Award Finalist April 26, 2021 New York, NY – April 23, 2021 – LIFARS LLC, a leader in cybersecurity services, including incident response, digital forensics,...
Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post The 2020 National Cybersecurity Awareness Month (NCSAM) October 21, 2020 In a year when many businesses have had to move their operations online, the need to protect digital devices has...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Blog Post What is CSIRT/CERT Team? August 14, 2020 Irrespective of whether or not you are familiar with incident response, you would have seen that CSIRT and CERT...
Blog Post What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
Blog Post Motivations Behind Cyber-Attacks March 4, 2020 Cyber attacks are malicious attacks on computer systems and networks for damaging data or disrupting operations. Common types of cyberattacks...