Explore Cyber Security on Experts Exchange

Expert Solutions for Your Tech Problems

Cyber Security

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software ...

Read more
  • 1.3K Content
  • 721 Contributors

Expert Spotlight
Expecto Patronum

cloudstart

Article

CVSS Explained:How to Evaluate and Prioritize Vulnerabilities in Your Organization

What is a Vulnerability ? In the context of cybersecurity, a vulnerability is a weakness or flaw in a system’s security posture that could potentially be exploited by attackers to gain unauthorized access, steal data, or cause damage. How to rate them, & prioritize remediation ?
Article

AI’s Crucial Role in Safeguarding Cryptography in the Era of Quantum Computing

In the era of quantum computing, AI emerges as a powerful ally in fortifying cryptography. This article explores AI's crucial role in safeguarding data security, including post-quantum cryptography, quantum key distribution, error correction, protocol optimization, and network planning.
Article

Capita Faces Class Action Over Data Breach.

Capita faces first legal letter over alleged data breach. Capita, a UK-based IT services company, has been served with its first legal letter over an alleged data breach that could have affected up to 9.5 million people.
Article

Ensuring the Security of Large Language Models: Strategies and Best Practices

Explore the essentials of securing Large Language Models (LLMs) in our comprehensive guide. Uncover the challenges of AI cybersecurity, learn to identify vulnerabilities, prevent adversarial attacks, and implement robust data protection. Stay ahead of the curve in maintaining model confidentiality .
Article
Credential Theft

MoveIt, Ofcom & the case of the exposed sensitive data

A security breach at file transfer tool MoveIt has exposed the data of thousands of users, including the UK telecom watchdog Ofcom and the Minnesota Department of Education.
Article

Leveraging GPT for Authentication: A Deep Dive into a New Realm of Cybersecurity

Explore the concept of leveraging Generative Pretrained Transformers (GPT) for authentication in cybersecurity. GPT models are typically used for natural language understanding and generation, but this article proposes using them as a means of behavioral biometric authentication.
Article
Pharma under attack

Ransomware Attacks on Pharma and Healthcare Industries

There is an increased attack on Pharmaceutical and healthcare providers that has massive implications on new drug discovery, clinical trials , manufacturing and directly impacts human lives. I had written an article on my blog specific to ransomware attacks on the Indian Pharma and healthcare sector
Article

ICS(Industrial Control System) Cybersecurity

Industrial Control System Cybersecurity is one of the most unsung, unpraised, unnoticed and yet one of the most valuable domain in society. This article will unveil the significance of Industrial Control System in cybersecurity.
Article

Bad data protection also affects law firms

The UK Information Commissioner has decided to issue Tuckers Solicitors LLP with a Penalty Notice under the Data Protection Act 2018 and EU GDPR 2018. This penalty notice imposes an administrative fine on Tuckers, to the amount of £98,000. Learn more about why this case is important!
Article
How CISOs can get support from Senior Management-Muneeb Imran Shaikh

How the CISO Can Build Support from Senior Management

1
Importance of appropriate Senior Management support for Cybersecurity and what is required to elicit the desired support. Article initially published by ISACA at below ink: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/how-the-ciso-can-build-support-from-senior-management
Article
Introduction to Cyber Security

Introduction to Cyber Security

8
Many folks reading about this topic struggle with the use of technical terms they don't fully understand. This article seeks to address that problem by providing some basic tips on Cyber Security in plain English. Enjoy and stay safe.
Article
Applied Collection Framework: A Risk-Driven Approach to Cybersecurity Monitoring

Applied Collection Framework: A Risk-Driven Approach to Cybersecurity Monitoring | Muneeb Imran Shaikh

1
This article was initially published by ISACA by the same author. The link for original publication is given below. https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/applied-collection-framework
Article

Aligning Business and IT Strategy: How Fadi Sodah is Leading His Business Into The Future

Fadi Sodah AKA "madunix" is an IT veteran with over twenty-six years of experience. He is a 2019 MVE and an IT Director in the Amman Stock Exchange. He has years of experience aligning IT Strategy with overall business strategy, two things which he says aren't distinguishable anymore.
Article
Challenges to Cyber Security Operations

Challenges Impairing Cyber Security Operations in Threat Hunting

This article discusses some of the fundamental issues that need to be identified and resolved before any Cyber Security Team embarks on the journey to Threat Hunting. Audience: Security Leadership & SOC Managers- Article does not delve into Threat Hunting technical and operational aspects
Article
Data Center Security

Data Center Security Solutions – Is Your DC Safe From Attacks?

It is impossible to stop security attacks on data centers. But, we can protect crucial information by opting for resilient data center security solutions. This guide is all about the different types of data center security measures a company can use to secure people's data.
Article

Leveraging & Understanding IT Security

Taking steps to protect your company’s data, hardware, and IT investment is a key part of your duty as an IT professional. When it comes to security, it’s critical to think of the potential to shape your organization through opportunities rather than see security measures as hurdles to productivity.
Article
Article
Multi-Cloud Strategy

Measures For Planning Success While Mapping A Multi-Cloud Strategy

We are going to list down some of the key factors that need to be considered at the time of mapping a multi-cloud strategy. Business clients should read this post to achieve a successful result after the adoption of a multi-cloud platform.
Article
Data Security Strategy

Strengthen Data Security Strategy With Smart Data Loss Prevention Solution

In the world of digitization, information is a valuable asset for businesses in every field. Today in this informative post, we are going to assist readers with security measures that most of the companies require. Read this post to determine the strategy that best suits your firm!
Article
Intelligent Data Loss Prevention

Intelligent Data Loss Prevention – Its Definition And Use in Businesses

There are several data loss prevention software in the marketplace and picking up one is really difficult. Today this particular post is going to describe the exact definition of an intelligent data loss prevention and its use in the business world.

Do more with Experts Exchange.


Get Answers

Join a Group Discussion

Collaborate

Monitor your Site

Explore solutions and more