Joao Silva

Joao Silva

Jun
10
Why Signal Should Be Your Go-To Instant Messaging App

Why Signal Should Be Your Go-To Instant Messaging App

In today’s digital age, instant messaging apps have become indispensable personal and professional communication tools. With numerous options available,
4 min read
May
31
AI Won’t Eat Your Job, But It Will Eat Your Salary

AI Won’t Eat Your Job, But It Will Eat Your Salary

Navigating the New World of Work As the sun rises on the era of artificial intelligence (AI), workers across the
3 min read
May
18
The Final Frontier

The Final Frontier

In the vast expanse of the digital universe, akin to the uncharted cosmos explored by the starship Enterprise in Star
2 min read
Apr
21
The Rising Threat: How APT Actors are Targeting MFA Systems

The Rising Threat: How APT Actors are Targeting MFA Systems

Multi-factor authentication (MFA) is a security measure that prevents unauthorised access to sensitive information in the constantly changing cybersecurity world.
2 min read
Apr
06
Understanding and Overcoming Breach Fatigue.

Understanding and Overcoming Breach Fatigue.

Data breaches have become common in the ever-evolving landscape of cyber threats. For IT leaders, the constant barrage of news
2 min read
Mar
26
Understanding Domain Permutation and Protecting Your Brand with Dnstwist

Understanding Domain Permutation and Protecting Your Brand with Dnstwist

In the digital age, the security of a brand's domain name is paramount. Cybercriminals often exploit similar-looking domain
2 min read
Mar
16
The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

The Dark Side of Shiny: Why Cybersecurity Experts are Moonlighting for the Bad Guys

Imagine this: a seasoned security professional, let's call him Alex, sits down at his computer after a long
3 min read
Mar
06
How to Monitor Your Network with LibreNMS and SNMP

How to Monitor Your Network with LibreNMS and SNMP

LibreNMS is a free and open-source network monitoring system that automatically discovers your network devices using various protocols provides customisable
7 min read
Mar
03
How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

How to Protect Your Business from Email Compromise in a Changing Cybersecurity Landscape

Business email compromise (BEC) is a cyberattack that targets organisations to steal money or critical information. The attacker impersonates a
2 min read
Mar
02
NVMe vs. Regular SSDs: What You Need to Know

NVMe vs. Regular SSDs: What You Need to Know

Solid-state drives (SSDs) are popular for many computer users who want faster and more reliable storage than traditional hard disk
4 min read