General

Speaking @ Cybersecurity: Securing Africa’s Businesses

Africa is a region often overlooked when it comes to cybersecurity. Although cyber infrastructure is not as developed as in other regions, African companies must look to secure their business in order to protect from data leaks and cyber attacks, such as the Wannacry ransomware in 2017. How best then to protect from cyber attacks? Invest Africa invites you to join [...]


Posted By Category: GeneralTags: , , Comments: 0

Amazon Best Seller (again)

We did again:) Our award winning book Cybersecurity Attack and Defense Strategies Books hits this month, Amazon's Best Selling list. Yuri and I are really proud and of course Thankful for all your support buying the book, taking time to share your feedback and pushing us to be better, Thank you dear readers we appreciate it Yuri and Erdal


History of Windows

Highlights from the first 34 years of Windows 1975–1981: Microsoft boots up Getting started: Microsoft co-founders Paul Allen (left) and Bill Gates It’s the 1970s. At work, we rely on typewriters. If we need to copy a document, we likely use a mimeograph or carbon paper. Few have heard of microcomputers, but two young computer enthusiasts, Bill Gates and Paul Allen, see that personal computing [...]


6 Best New Social Engineering Books To Read In 2019

I'm happy to announce that my book, "Learn Social Engineering: Use different social engineering tools to perform information gathering, prevention and mitigation of threats", made it to BookAuthority's Best New Social Engineering Books:https://bookauthority.org/books/new-social-engineering-books?t=bbhbra&s=award&book=1788837924BookAuthority collects and ranks the best books in the world, and it is a great honor to get this kind of recognition. Thank you for all your [...]


Posted By Category: Awards, Book Reviews, GeneralComments: 0

A Cybersecurity Strategy for the Financial Sector

Understand the threats to financial cyberspace and learn how to implement the right strategy to secure your organization. This presentation will take you through some of the most well-known case studies and real-life threat scenarios and how to tackle them so as to protect your financial services and related infrastructure. You can watch the webinar via registering in [...]