Category: Data Security

  • Common Cybersecurity Threats for Enterprises in 2022  

    Common Cybersecurity Threats for Enterprises in 2022  

    The cybersecurity industry has rapidly changed in recent days. New threats – as well as new approaches for combating them – emerge continuously. Since the scale and sophistication of cyber-attacks are growing, industries require increased data security. No wonder businesses are now chasing to search for scalable cyber defense solutions.

  • Security in Software Development – Taking the Right Approach

    Security in Software Development – Taking the Right Approach

    How important is it today to develop secure software? Well, given the recent increase in successful cyber attacks caused by some applications’ vulnerabilities, building secure software from scratch has become extremely crucial!

  • Software Development for Healthcare – IT Standards & Regulations

    Software Development for Healthcare – IT Standards & Regulations

    Nowadays, IT healthcare solutions are vital for medical organizations to function properly. MedTech software, such as medical ERPs, EHRs, and medical applications bring the digital revolution to healthcare and help medical organizations develop faster. Nevertheless, IT protocols remain in the grey area of healthcare software development as yet.

  • Log4Shell – Critical Vulnerability Discovered in Apache Log4j

    Log4Shell – Critical Vulnerability Discovered in Apache Log4j

    Apache Log4j is a Java-based logging utility, that is part of the Apache Logging Services, a project of the Apache Software Foundation. On December 9, 2021, a zero-day vulnerability involving arbitrary code execution in Log4j 2 was discovered by Chen Zhaojun of Alibaba Cloud Security Team and disclosed via the project´s GitHub repository and given…

  • All you need to know about Apple’s new iPhone Privacy Features

    All you need to know about Apple’s new iPhone Privacy Features

    With the release of iOS 14.5, the iPhone software asks customers whether they want apps to follow their digital behavior. While it may appear to be a minor move, it has already caused ripples throughout the app economy, notably at Facebook and Google, the internet’s two largest ad companies.

  • High Availability and Disaster Recovery

    High Availability and Disaster Recovery

    Disaster can strike at any time. Will you be ready to react quickly and efficiently? This article aims to show how the application architecture, especially the deployment architecture, can help us prepare for DR.

  • Disaster Recovery & Business Continuity

    Disaster Recovery & Business Continuity

    What are your associations when someone talks about a catastrophe? Hurricane, flood, etc. However, we are aware that our data may also be exposed to various threats. In this article, I will explain what types of threats our data is exposed to, what DR plans are, and how to protect your data from disasters.

  • 1.3 million Database with Clubhouse Users Available to the Public! It’s not a Leak, it’s Data Scraping

    1.3 million Database with Clubhouse Users Available to the Public! It’s not a Leak, it’s Data Scraping

    Recently, the world has been informed about another “leak”. According to the Cyber ​​News portal, the database of over 1.3 million records from Clubhouse was published by hackers. Is the so-called data scraping a fresh trend among cybercriminals who want to earn money by selling data? It’s another cybersecurity topic in addition to the most recent listing of the database with over…