Satoshi Nakamoto Blog

Category : cybersecurity

cyber security cybersecurity email phishing email phishing scams Online Security phishing attack Spear Phishing

Why Minimizing Human Error is the Only Viable Defense Against Spear Phishing

Phishing attacks have become one of the business world’s top cybersecurity concerns. These social engineering attacks have been rising over the years, with the most...
CISO cybersecurity cybersecurity checklist Cynet hacking checklist Security Architect SOC manager

The Ultimate Security Pros’ Checklist

You are a cybersecurity professional with the responsibility to keep your organization secured, you know your job chapter and verse, from high level reporting duties...
Artificial Intelligence/AI Business-to-Business/B2B cybersecurity Data & Analytics Financial Services/Finserv homepage-featured-4 Internet of Things/IoT Investment & Funding OTB Ventures

OTB Ventures raises $100m for Central and Eastern European tech start-ups – FinTech Futures

OTB Ventures, the Polish investor focused on the Central and Eastern Europe (CEE), has raised a $100 million (€92.4 million) fund to support the region’s...
Banking credit cards cybersecurity data Finance Privacy pseudoanonymized Technology Yodlee

Firm Tracking Purchase, Transaction Histories of Millions Maybe Not Really Anonymizing Them

Photo: Joe Raedle (Getty Images) The nation’s largest financial data broker, Yodlee, holds extensive and supposedly anonymized banking and credit card transaction histories on millions...
2016 election cybersecurity Elections espionage guccifer 20 Hackers Hacking Julian Assange Russia Technology WikiLeaks

Trump Offered Me a Pardon to Say the Russians Didn’t Hack Dems in 2016

Photo: Leon Neal (Getty Images) Lawyers for beleaguered WikiLeaks founder Julian Assange claim that Donald Trump offered him a pardon if he’d claim the 2016...
cybersecurity cybersecurity tool Cynet Penetration Testing Threat Assessment vulnerability assessment

Cynet Offers Free Threat Assessment for Mid-sized and Large Organizations

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard process of 3rd party threat assessment as...