Odyssey’s blog offers exclusive content by our cybersecurity analysts and executives.

  • As the 1980s drew to a close, a groundbreaking development was unfolding: the internet was opening its doors to the public. This digital revolution transformed the way we share information, connect with others, and conduct business.

  • Today, as we mark Data Protection Day, let’s take a moment to talk about something we often overlook: our passwords. Think of this as your friendly reminder to re-evaluate those little protectors of your online life. We’re here to make this journey informative, with practical and valuable insights t

  • As cyber threats evolve with alarming speed and complexity, one of the most effective means of defense is staying well-informed. This comprehensive guide breaks down the sophisticated process of a cyberattack into seven distinct stages.

  • The 1980s were a pivotal time in the world of technology and cybersecurity. The 1980s marked the beginning of the digital age, with personal computers entering households and businesses alike.

  • Email remains a vital tool for businesses to communicate and collaborate effectively. It’s the backbone of productivity, efficiency, and cost-effectiveness. However, it’s also a prime target for cyber threats that can disrupt operations, compromise sensitive data, and lead to legal and financial dis

  • As our reliance on technology grows, so does the threat of cyber crime. To gain a comprehensive understanding of the scope of this issue, the United Kingdom’s Government relies on precise definitions and guiding principles, as outlined in the Computer Misuse Act 1990 and the Home Office Counting Rul

  • As Black Friday and Cyber Monday continue to gain momentum in the world of retail, the significance of cybersecurity cannot be overstated. Black Friday and Cyber Monday have become synonymous with bargain hunting and online shopping extravaganzas.

  • Cybersecurity has come a long way since its inception in the early days of computing. In this blog post, we’ll take you on a journey through the history of cybersecurity in 1970, highlighting key milestones and influential figures.

  • In today's digital landscape, organizations struggle with pressing cybersecurity challenges: minimizing damage during incidents, complying with complex regulations, fostering resilience, and staying ahead of evolving threats. How can they also preserve reputation and stability during crises?

  • Phishing attacks have become a widespread problem in the digital world. They’re no longer as obvious as before, and they’ve evolved into highly convincing tricks that can deceive even the most careful individuals.

  • In the vast landscape of the digital world, where information flows seamlessly and networks connect us like never before, network security has become a necessity.

  • Delve into the intriguing world of 1960s cybersecurity, where the first known instances of computer hacking, password protection, and viruses emerged. Join us on a journey through history as we explore these groundbreaking developments and their lasting impact on the cybersecurity landscape.

  • Travel back in time with us to explore the captivating history of cybersecurity. Our blog series is your gateway to the evolution of digital security, from its humble beginnings to today's complex landscape.

  • With organizational data and sensitive information stored in remote locations via cloud services, cloud security strategies have never been more relevant. Migrating operations to the cloud is steadily becoming the norm for today’s reality.

  • In the Cyber era, the most valuable asset of any organization is not just their cutting-edge technology, but their employees - the human element that can make or break cybersecurity defenses.

  • Organizations choose to fully or partially migrate their operations to the cloud as it provides resilience, elasticity, and a reduction in their total cost of ownership. Research by Gartner shows that over 95% of new digital workloads will be deployed on cloud-native platforms by 2025, up from 30% i

  • As cybersecurity threats become more frequent and sophisticated, businesses in Greece are facing greater challenges in safeguarding their valuable assets.

  • While “Digital Transformation” is an opportunity of paramount importance for any modern organization, as it is shaping the way businesses operate, the risks associated with it also continue to evolve.

  • Cybersecurity threats are increasing in frequency and complexity, making it more challenging for businesses in Cyprus to stay protected.

  • The pandemic has revolutionized the way we work, and remote work has become the new norm.

  • The rise of smart devices and changing customer preferences has kickstarted global digital transformation which has revolutionized the way organizations operate, presenting new opportunities for growth and innovation.

  • The rise of cyber-attacks against public and private entities in Cyprus is a growing concern that is not expected to abate anytime soon.

  • Cyber-attacks are on the rise in Cyprus, with both public and private sectors being targeted almost every day, a trend that unfortunately is expected to continue and grow.

  • While technological innovations have immensely grown customer convenience, operational efficiency and commerce possibilities, they are not without their own challenges.

  • Safer Internet Day, designed as a reminder of the importance of cybersecurity education. While Cybersecurity is less likely to be top of mind in organisations that are not particularly technological, the rise in cyberattacks taking place the last few years and especially in 2021 , make Cybercrime a

  • While technological innovations have immensely grown customer convenience, operational efficiency and commerce possibilities, they are not without their own challenges.

  • Safer Internet Day, designed as a reminder of the importance of cybersecurity education. While Cybersecurity is less likely to be top of mind in organisations that are not particularly technological, the rise in cyberattacks taking place the last few years and especially in 2021 , make Cybercrime a

  • The past few years have given rise to the trend of cloud adoption and migration, not just for technology sector, but for every industry. Many modern organizations choice to conduct their operations via cloud services, either fully or partially. While cloud migration seems to be the right choice in g

  • With an increased dependency on technology and information, organizational networks keep broadening well beyond the confines of organizational cyber defenses. This wide adoption of digital applications expands the threat landscape, this way presenting malicious actors with novel opportunities to exp

  • Nowadays, with the increasing volume and complexity of cyber-threats, security monitoring and operations have become a necessity, holding a primary role in the Cloud and Information Management efforts of an organization. Organizations invest in the development of Security Operations Centers (SOCs) t

  • Chances are you have at least one contact who’s been hacked at least once, either to their knowledge or not. This includes malicious acts, from the theft of their social media accounts to the exposure of their banking details. And chances are that one or more of your personal data sets will, sooner

  • There is much confusion in the cybersecurity community about the terms “penetration test” (pentests) and “vulnerability assessment”, with both oftentimes being used interchangeably. When there is a miscommunication of defining security-related terms, there could be a gap between expectation and resu

  • In cybersecurity, every little detail matter. Each organization is different, with individual characteristics, and your cybersecurity needs are unique to you. This is why choosing the right service provider for your security solutions is key to getting the most value out of your security investments

  • Penetration Testing (pentesting) is not a mere compliance obligation. Its usefulness was recognized by industry leaders well before regulatory frameworks mandated them to simulate real-world cyberattacks. So, what are the benefits you can expect from regular penetration testing?

Subscribe

Sign up to receive the latest security news and trends from Odyssey.

Stay up to date with useful content from world leading experts in Cloud & Information Security.