The rapid evolution of both quantum computing and artificial intelligence (AI) presents humanity with incredible opportunities, but also introduces significant challenges to our digital security landscape, particularly the public key encryption that underpins our modern world. For years, complex mathematical formulas have been the bedrock of cryptography. However, the convergence of AI and quantum computing […]
With Zero Trust, users can access only the approved applications, systems, or specific resources they need, when they need them. Think about your network security. Is it like throwing an open house party, leaving your business exposed? What do your security measures and a house party have in common? The Danger of ‘Trust at […]
See what the OWASP Foundation’s top 10 vulnerabilities are for large language models. The AI explosion, fueled by large language models (LLMs), has sparked both excitement and concern. To address potential risks, OWASP Foundation has outlined the top 10 vulnerabilities facing LLMs. Let’s break them down: Prompt Injection: Attackers can manipulate LLMs through carefully designed prompts. […]
By providing employees with the training and knowledge to recognize phishing and social engineering attacks, businesses can strengthen their security posture, significantly reduce human error, and stay ahead of evolving threats. We can always count on people making mistakes. While most of our mistakes do not significantly affect our lives, some, even minor, everyday errors […]
Golden button: To better protect ourselves, we need to think beyond computer security. We need ways to physically control our network connections. On April 28th, 2025, something big and scary happened in Europe. The lights went out across Spain and Portugal. This blackout wasn’t just a small problem – it was huge, one of the […]
Beware: Believing that having sophisticated cybersecurity tools in place is enough leads to a precarious false sense of security. Even for SMBs. We often equate having more with being safer, a comforting thought that extends even to the complex world of cybersecurity. The idea that a larger arsenal of cybersecurity tools automatically translates to stronger […]
Two out of three SMBs are likely or very likely to switch vendors or MSSPs after a negative experience. MSSPs simply can’t afford unhappy SMB owners because their cybersecurity platform or MDR isn’t manageable enough. Many Managed Service Providers (MSPs) find themselves grappling with increasingly inefficient methods of managing their diverse channel customers. The experience […]
Law firms are prime targets for cybercriminals — and many still aren’t taking the threat seriously enough. With access to vast amounts of sensitive client information, from personal details to financial data, law firms are a goldmine for hackers. The legal sector continues to top the charts for data breaches, with a staggering 86% of incidents involving […]
Utimaco and CREAPLUS have outlined their cooperation in 2025, which will be marked by new solutions that make it easier for companies to comply with legal requirements in managing cybersecurity and resilience and protecting data. Following a successful business year, Utimaco and CREAPLUS representatives outlined their plans for 2025, which will focus on joint activities […]
In Budva, the Association of Security Managers of Montenegro organized the conference “Security without compromise”, which addressed the current challenges of regional companies in the field of corporate security. Mitja Trampuž, CEO at CREAPLUS, and President of the AI4SI initiative and Vice president of the Section for Cyber Security, which operate within the Association for Informatics and Telecommunications […]