Cybersecurity Essentials

Startups & Investments

Cybersecurity is one of the hottest market for innovation and funding. These opportunities have given rise to a new ecosystem of security startups of which, some will emerge as new leaders in the years to come.

Top news of the week: 04.05.2021.

#cybersecurity
#verifiablecredentials
#decentralizedidentifiers
#workingfromhome
#homeoffice
#infosec
#wfh
#geercom
#CloudComputing

Innovations And Trends

@DrInfoSec shared
On May 1, 2021
Microsoft warns of damaging vulnerabilities in dozens of IoT operating systems https://t.co/OQD9Qyi279 [wow, that's quite the list of IoT OSes & devices]
Open
Microsoft warns of damaging vulnerabilities in dozens of IoT operating systems

Microsoft warns of damaging vulnerabilities in dozens of IoT operating systems

The flaws affect at least 25 different products made companies like Amazon, ARM, Google Cloud, Samsung, RedHat, Apache and others.

@techstars shared
On Apr 29, 2021
Want to be inspired today? Read this interview with @AhmedElmurtada, Techstars community leader in the Sudan. He's been running @StartupWeekend's in Sudan since 2013, because he believes entrepreneurship can help solve some of his country's many problems: https://t.co/F5HIF2vQOS https://t.co/tP8WC8aH9H
Open
5 Questions with Ahmed Elmurtada, Sudan Community Leader

5 Questions with Ahmed Elmurtada, Sudan Community Leader

"Techstars programs didn't only impacted my life, but I believe all of the Sudan entrepreneurship ecosystem as being one of the first global programs being held in Sudan."

@hackernoon shared
On Apr 28, 2021
"Understanding the Verifiable Credentials (VCs)" by @MickeyMaler https://t.co/IsXBnTuhzj #verifiablecredentials #decentralizedidentifiers
Open
Understanding the Verifiable Credentials (VCs)

Understanding the Verifiable Credentials (VCs)

Verifiable Credentials heavily utilize Decentralized Identifiers to identify people, organizations, and things and to achieve security and privacy guarantees.

@geercom shared
On Apr 29, 2021
If you worry criminal hackers will enter your home office technology, this article is for you. The Communications of the ACM published it today. Cyber-securing the Home Office #workingfromhome #cybersecurity #wfh #infosec #homeoffice #geercom https://t.co/gMpDGlQ9hh
Open
Cyber-Securing the Home Office

Cyber-Securing the Home Office

Patching the security holes that arise when working from home.

@MichaelCromwell shared
On May 3, 2021
RT @magnafive: We are proud to announce that Magna5 and SpinnerTech have joined forces to become a singular trusted managed service provider offering an even broader spectrum of fully managed IT solutions and services. https://t.co/cwYcQ5XYDQ https://t.co/t7Eywd2abM
Open
Magna5 Bolsters Managed Services Business Through Acquisition of SpinnerTech

Magna5 Bolsters Managed Services Business Through Acquisition of SpinnerTech

Magna5 acquires SpinnerTech, a New York-based managed IT services and cloud hosting company serving customers across a wide range of verticals.

@hackernoon shared
On Apr 28, 2021
"How To Protect Your Online Applications From Pass-the-Cookie Cyber Attacks" by @geenensp https://t.co/CxJxcWkF79 #cybersecurity #cybersecurity
Open
How To Protect Your Online Applications From Pass-the-Cookie Cyber Attacks

How To Protect Your Online Applications From Pass-the-Cookie Cyber Attacks

How to strengthen your online apps against cloud service attacks such as ‘pass-the-cookie’ attacks.

@antgrasso shared
On Apr 28, 2021
Many attempts at cloud migration projects fail; time and money are wasted, and people are frustrated. Opportunities and challenges connected with cloud migration are still totally unknown territory. Source @PredicaExperts Link https://t.co/EsoPnKX4I6 @antgrasso #CloudComputing https://t.co/dsxyBboC58
Open
Cloud migration project plan

Cloud migration project plan

These 5 points will help you not to break your cloud migration project. These 5 points will help you not to break your cloud migration project. Let's dive in!