Security guru from Facebook, Juniper & Google: Nick Bilogorskiy

Security guru from Facebook, Juniper & Google: Nick Bilogorskiy

Security guru from Facebook, Juniper & Google: Nick Bilogorskiy Nick Bilogorskiy who has recently headed Trust and Security department at Google, exclusively for #UnderDefenseVlog has given an interview about his career path in cybersecurity. His CV includes such...
CISO Answers – with Michael Schindler

CISO Answers – with Michael Schindler

CISO Answers – Interview with Michael Schindler #CISOAnswers is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. Watch our interview with – Michael Schindler – a leader with strong...
CISO Answers – Interview with Matthew Sciberras

CISO Answers – Interview with Matthew Sciberras

CISO Answers – Interview with Matthew Sciberras “CISO Answers” is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics. The first of our exclusive CISO Interviewees is Matthew Sciberras – Director...
IoT attack simulation and ways to protect

IoT attack simulation and ways to protect

IoT attack simulation and ways to protect  Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security...
Mac based antimalware training

Mac based antimalware training

Mac antimalware training Apple customers believe that no adversaries can hack their personal data or access important files. We bust this myth about perfectly secure MacOS devices! During our Security Awareness training, we demonstrate how anyone can break this...
Roadmap of UD services

Roadmap of UD services

UnderDefense cybersecurity services roadmap The statistics show that cybersecurity issues are becoming a day-to-day struggle for businesses. That’s why thinking about your security posture is a number one task for all go-ahead companies. Your sensitive data and...

Pin It on Pinterest