Thursday , November 21 2024

Uncategorized

"Anonymous Collective" claim respnsibility
Cairo International Airport Thwarts Hacking Attempt

Cairo airport

Cairo Airport Company’s website was attacked by cyber criminals. The attack was stopped successfully, setting an example in cybersecurity. The website’s services were suspended temporarily, but will resume by the end of the day. The company assured that the website’s services and data were secure and not affected by the …

Read More »

Seminar on cyber security held at RUET

Guest presented at the seminar.

A seminar called “Ensuring Cybersecurity and Preventing Cyber Crime” took place at Rajshahi University of Engineering and Technology (RUET). The seminar was organized by the Department of Information and Communication Technology’s Digital Security Agency (proposed National Cyber Security Agency). The seminar was led by Dr. Md. Al Mehdi Hasan, the …

Read More »

IBM launched Cloud-Native SIEM improving security

IBM World Headquarters

IBM has launched Cloud-Native SIEM solution to improve security teams’ scale, speed, and flexibility. Organizations can benefit from improved threat detection and response capabilities with this new offering. It helps them protect their digital assets and stay ahead of cyber-attacks. IBM Security secures big companies and governments with a range …

Read More »

Bangladesh store countries data inside the country thru’ Meghna Cloud

Bangladesh has built its first domestic cloud data center called ‘Meghna Cloud’. The main purpose of this center is to store the country’s data within its borders. The speakers said that Meghna Cloud will help Smart Bangladesh progress. They made these comments at a workshop called “Data security in building …

Read More »

“Aspire security awareness training” a versatile platform for security training

We need cybersecurity because our lives are becoming more digital. Our personal and professional activities are increasingly done online, which puts us at risk of cyber attacks. Cybersecurity is the protection of systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It is important for individuals, …

Read More »