This Week in CyberspaceThis Week in Cyberspace (19-25 March 2022) March 25, 2022 Lale Çorumlu vulnerabilitylog4jLog4ShellmalwaremicrosoftPhishingransomwarecyber securitycyber security newscyber security tips
This Week in CyberspaceThis Week in Cyberspace (12-18 March 2022) March 18, 2022 Lale Çorumlu vulnerabilitylog4jLog4ShellmalwaremicrosoftPhishingransomwarecyber securitycyber security newscyber security tips
This Week in CyberspaceThis Week in Cyberspace (26 February-4 March 2022) March 4, 2022 Lale Çorumlu vulnerabilitylog4jLog4ShellmalwarePhishingransomwarecyber securitycyber security newscyber security tipsukraine russia war
This Week in CyberspaceThis Week in Cyberspace (12-18 February 2022) February 18, 2022 Lale Çorumlu vulnerabilitylog4jLog4ShellmalwarePhishingransomwarecyber securitycyber security newscyber security tipstrojanvirus
Cybersecurity NewsDesigning Security to Mitigate Growing Ransomware Threats January 30, 2022 Lale Çorumlu ransomwaresecuritycyber securitycyber security newscyber security tips
Cybersecurity NewsWhat Should Employees Pay Attention To When Using Social Media? January 23, 2022 Lale Çorumlu cyber securitycyber security newscyber security tipssocial media
Cybersecurity NewsTwo-Fifths of Ransomware Victims Still Paying Up January 22, 2022 Lale Çorumlu ransomwareransomwarecyber securitycyber security newscyber security tips
Cybersecurity NewsThe Supply Chain Needs Better Cybersecurity and Risk Management January 18, 2022 Lale Çorumlu cyber securitycyber security newscyber security tipssupply chain
Cybersecurity NewsGDPR Data Privacy Regulations and Impact on SaaS Companies and Their Vendors January 16, 2022 Lale Çorumlu GDPRKVKKSaaScyber securitycyber security newscyber security tips
Cybersecurity News4 Essential Secyrity Skills for Modern Application Development January 13, 2022 Lale Çorumlu securitycyber securitycyber security newscyber security tipsapplication development