Posts by author
Panda Security
10 Secure File Sharing Options and Tips
In the current world of technology, pictures, documents and files are no longer shared in the physical form. Most are transferred through online tools. While…
The consequences of not applying patches
Many recent cyberincidents in have shared one characteristic: they have been possible thanks to a vulnerability in an IT system that needed patches.
The future of security lies in quantum computing
The future of computing is in quantum mechanics, and the sector that has most to gain from quantum computing is the security sector.
What is the difference between sandboxing and honeypots?
Today we take a look at two strategies that are very common in the sector: honeypots and sandboxing, two IT risk prevention strategies.
How to Boost WiFi Signal
In a time when almost everyone relies on WiFi, connection is key. Thanks to WiFi, endless cords, ports and connectors are things of the past.…
Only 54% of companies know where their data is
These problems when it comes to finding unstructured data could be a question of volume, having an average cost of 3.86 million dollars for a data breach.
XSS vulnerabilities are still alarmingly common
In the last nine years, the most frequent bug on websites the world over has been the vulnerability XSS, which makes up 18% of the bugs found.