The best way to guard against becoming a target of social engineering is to familiarize yourself with the strategies, psychological hooks, and technological means...Alex Vakulov From BLOG@CACM | August 21, 2023 at 03:34 PM
The importance of information security technologies cannot be overstated, given how deeply integrated gadgets have become in our lives.
Alex Vakulov From BLOG@CACM | May 31, 2023 at 11:26 AM
The tool characteristics and parameters you need to pay attention to, and the product types currently available on the market.
Alex Vakulov From BLOG@CACM | October 27, 2022 at 01:18 PM
A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.
Alex Vakulov From BLOG@CACM | October 18, 2022 at 12:58 PM
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Alex Vakulov From BLOG@CACM | August 10, 2022 at 01:24 PM
Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Alex Vakulov From BLOG@CACM | October 28, 2021 at 09:44 AM