Explore Cyber Security on Experts Exchange

Expert Solutions for Your Tech Problems

Cyber Security

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software ...

Read more
  • 1.4K Content
  • 741 Contributors

Expert Spotlight
COG Lead Engineer

I'm Shaun Vermaak. I love tech and how it improves life and business. Did you find what you were looking for?

Article

NIST CSF vs NIST SP 800-53

There’s a common mix-up I’ve seen happen over and over: someone pulls up NIST CSF, then references controls from NIST SP 800-53, assuming they’re interchangeable. They’re not. They’re related, but they serve very different purposes.
Article

Cybersecurity Standards Explored

Let’s be honest, when you first dive into cybersecurity frameworks, it feels confusing. ISO this, NIST that, PCI over there. It’s easy to get lost, even if you’ve been around the tech world for a while.
Article

Securing Your Azure Key Vault

Managing credentials, encryption keys, and secrets in Microsoft Azure depends critically on Azure Key Vault. Acting as a centralised storage point, it helps businesses protect private data.
Article

Get More Signal, Less Noise: Overcoming SIEM Systems Challenges and Enhancing Detection

SIEM systems are a must have for robust security. But they only work if you overcome the big challenges like log volume, alert fatigue and integration issues.
Article

From Crisis to Prevention: Managing Data Breaches Effectively

Data breaches are among the most pressing challenges organizations face today, with insider threats, phishing attacks, and vulnerabilities driving an alarming rise in incidents. The cost of financial and reputational breaches underscores the critical need for robust cybersecurity measures.
Article

ISO27001: From Compliance to Certification

1
ISO 27001, a globally recognized information security standard, was updated in 2022. Implementation involves aligning policies and controls efficiently.
Article

Top 5 Cyber Attacks of 2024

A number of startling cyberattacks in 2024 have highlighted the need to upgrade our digital defences. Cyber enemies have shown to be more sophisticated and persistent than ever before, taking advantage of weaknesses in vital infrastructure and breaking into large organisations.
Article

What is a Cyber Incident Response Plan?

In today's digital world, cyber dangers are a constant concern. No organization is immune to cyber catastrophes, and how quickly and efficiently you respond might be the difference between a little issue and an immense tragedy.
Article

What's Cloud Security Posture Management?

Organisations depend increasingly on cloud infrastructure to hold private data, control workloads, and inspire innovation as the adoption of clouds grows. This is where Cloud Security Posture Management comes into picture.
Article

The important of cyber security.

1
Cybersecurity protects networks and data from unauthorized access and threats like malware, phishing, and ransomware. Key concepts include the CIA triad (confidentiality, integrity, availability) and risk assessment. Best practices involve employee training, strong password policies, software update
Article
WTND

Weekly Tech News Drop - August 23, 2024

In this week's WTND we check out rocket explosions in Scotland, Microsoft's upcoming cybersecurity summit, Samsung's new glassless 3D monitor, and more!
Article
Weekly Tech News Drop

Weekly Tech News Drop - June 28, 202

In this week's WTND - NASA canceled a spacewalk due to a spacesuit leak. TeamViewer had a security breach. Datadog launched a low-code tool. And a UK boy is world first recipient of skull fitted epilepsy device.
Article

IT Basics for Small Businesses

This paper was originally posted on Experts-Exchange in 2010 and has been updated as a six-part series with current information here and on my Blog site – www.notacomputergeek.com. As often as technology changes, a revision was way overdue and should likely a work in progress. So, keep checking back
Article

CVSS Explained:How to Evaluate and Prioritize Vulnerabilities in Your Organization

What is a Vulnerability ? In the context of cybersecurity, a vulnerability is a weakness or flaw in a system’s security posture that could potentially be exploited by attackers to gain unauthorized access, steal data, or cause damage. How to rate them, & prioritize remediation ?
Article

AI’s Crucial Role in Safeguarding Cryptography in the Era of Quantum Computing

In the era of quantum computing, AI emerges as a powerful ally in fortifying cryptography. This article explores AI's crucial role in safeguarding data security, including post-quantum cryptography, quantum key distribution, error correction, protocol optimization, and network planning.
Article

Capita Faces Class Action Over Data Breach.

Capita faces first legal letter over alleged data breach. Capita, a UK-based IT services company, has been served with its first legal letter over an alleged data breach that could have affected up to 9.5 million people.
Article

Ensuring the Security of Large Language Models: Strategies and Best Practices

Explore the essentials of securing Large Language Models (LLMs) in our comprehensive guide. Uncover the challenges of AI cybersecurity, learn to identify vulnerabilities, prevent adversarial attacks, and implement robust data protection. Stay ahead of the curve in maintaining model confidentiality .
Article
Credential Theft

MoveIt, Ofcom & the case of the exposed sensitive data

A security breach at file transfer tool MoveIt has exposed the data of thousands of users, including the UK telecom watchdog Ofcom and the Minnesota Department of Education.
Article

Leveraging GPT for Authentication: A Deep Dive into a New Realm of Cybersecurity

Explore the concept of leveraging Generative Pretrained Transformers (GPT) for authentication in cybersecurity. GPT models are typically used for natural language understanding and generation, but this article proposes using them as a means of behavioral biometric authentication.
Article
Pharma under attack

Ransomware Attacks on Pharma and Healthcare Industries

There is an increased attack on Pharmaceutical and healthcare providers that has massive implications on new drug discovery, clinical trials , manufacturing and directly impacts human lives. I had written an article on my blog specific to ransomware attacks on the Indian Pharma and healthcare sector

Do more with Experts Exchange.


Get Answers

Join a Group Discussion

Collaborate

Monitor your Site

Explore solutions and more