Staying One Step Ahead: Understanding Software Exploits and How to Defend Against Them CybersecurityMiguel LordeloAugust 14, 2023CyberSecurity, SoftwareExploits, SecureCoding, PatchManagement, DefenseInDepth, SecurityAwareness, EthicalHacking CollaborativeDefense, StaySecure
Handling Discovered Vulnerabilities in Third-Party Code and Systems CybersecurityMiguel LordeloAugust 7, 2023CyberSecurity, SoftwareExploits, SecureCoding, PatchManagement, DefenseInDepth, SecurityAwareness, EthicalHacking, CollaborativeDefense, StaySecure
DevSecOps vs. DevOps – Why is It Important for Development Cycle? CybersecurityJuliane VeríssimoMarch 11, 2021cybersecurity, software development, DevOps, DevSecOps, security, IT
What is GDPR, and How Does It Impact You as Costumer and as Business? - Part 1 CybersecurityJuliane VeríssimoJanuary 13, 2021cybersecurity, gdpr, data protection, data, privacy, general data protection regulation
Mobile Security Threats CybersecurityJuliane VeríssimoOctober 15, 2020cyberattack, cyber crime, cybersecurity, mobile threats
11 Mobile Security Tips For Organization Cybersecurity, BusinessJuliane VeríssimoAugust 18, 2020IoT, Modile, cyberattack, cybersecurity
Password Protection CybersecurityJuliane VeríssimoJune 16, 2020strong passwords, phishing e-mails, phishing, cyberattack, cybersecurity, password protection, password security, hackers
Cybersecurity and Defense: How Vulnerable Are Space Assets? Space, CybersecurityJuliane VeríssimoApril 9, 2020cybersecurity, space, space assest, cyberattack, space threat
Why Cybersecurity Matters for Space Tech CybersecurityJuliane VeríssimoJanuary 7, 2020cybersecurity, space, space tech