Learn Search

Search across all Learn content

Editorial

Expressions & POVs

Expert takes, practical perspectives, and opinionated security narratives.

Everything You Need to Know about Cybersecurity in Retail

Point of View

Everything You Need to Know about Cybersecurity in Retail

Everybody shops online or in supermarkets and shops. The digital transformation has aided and simplified how we shop. But every change comes with a drawback, too. So, in the case of the retail industry, the drawback is the drastic rise in hackers targeting them over the last few years. So, what is t...

Oct 15, 2024 • 7 min read

Story of Cyberattack – Change Healthcare

Point of View

Story of Cyberattack – Change Healthcare

Even the most trusted healthcare providers aren’t immune to cyberattacks. One such victim was “Change Healthcare”, a major company in the healthcare industry, providing essential services such as data analytics, payment processing, and software for healthcare systems. Founded to streamline healthcar...

Oct 14, 2024 • 6 min read

Everything you Need to Know about Linux Patch Management

Point of View

Everything you Need to Know about Linux Patch Management

In today’s IT environment, the security of your Linux systems is paramount as they are heavily dependent OS by developers. With cyber threats constantly evolving, effective patch management for linux is your frontline defense; essential updates keep everything running smoothly and safely. Yet, navig...

Sep 26, 2024 • 5 min read

Best Practices to Strengthen Cybersecurity in Finance

Point of View

Best Practices to Strengthen Cybersecurity in Finance

According to reports, financial firms experienced a 39% increase in cyberattacks in 2023!

Sep 08, 2024 • 5 min read

Proactive vs Reactive Cybersecurity

Point of View

Proactive vs Reactive Cybersecurity

Organizations are constantly under threat from cyberattacks. Hackers are more creative than ever, and the threat landscape continues to grow. Every 39 seconds, a cyberattack occurs somewhere in the world. With the average cost of a data breach costing up to $ 4.45 million in 2023. The key to staying...

Aug 26, 2024 • 4 min read

Understanding Centralized Patch Management: One View for All Your Patches

Point of View

Understanding Centralized Patch Management: One View for All Your Patches

Would you rather have different dashboards for each of your OS groups and jump through multiple hoops to get info and patch your devices? Or just a single one to do it all? The answer is obvious, right? Centralized patch management is the superior way of doing things, and you are missing out on a lo...

Aug 22, 2024 • 5 min read

Building a Solid Patch Management Plan to Ward-Off Cyberattacks

Point of View

Building a Solid Patch Management Plan to Ward-Off Cyberattacks

Handling security in today’s cybersecurity landscape is definitely not easy!

Aug 21, 2024 • 4 min read

Securing Every Angle – A Threat Model for an IoT Enabled Smart Parking System

Point of View

Securing Every Angle – A Threat Model for an IoT Enabled Smart Parking System

Welcome to the second part of this two-part blog on IoT security! The first part explained how IoT-enabled self-driving cars work and how to secure communications between them. You can read the first part here.

Jul 16, 2024 • 11 min read

Eyes, I Mean Sensors On the Road – Understanding and Safeguarding IoT in Cars

Point of View

Eyes, I Mean Sensors On the Road – Understanding and Safeguarding IoT in Cars

I recently started learning to drive. The first class left me panicked and overwhelmed. The Herculean task of turning, as well as having to remember that the car took up more space than just my seat, left me never wanting to drive again. Subsequent classes were less scary, but I still found myself w...

Jul 16, 2024 • 11 min read