Filters
Cybersecurity and cyberdefense of internet networks. Are Ukraine and the EU ready for a global cyberwar?
Challenges remain serious: ongoing attacks on public sector and critical infrastructure demonstrate that even the...
6 days agoPavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals
eQtalk is an original project by the eQtv channel. The guest of the episode is...
7 days agoEvgeny Vladimirov: Chronicles of russia's Cyberwar Against Ukraine – Energy Sector in Targeting
eQtalk is an original project of the eQtv channel. The guest of the issue is...
1 week agoHow does CERT-UA help energy companies, why is it important to connect to MISP?
Ukraine's energy facilities are hackers' top targets. CERT-UA's Evgeniy Briksin explains how the MISP platform...
2 weeks agoHow your data is being sold. Protecting yourself from breaches
Your data is being traded on the Internet. Moreover, a criminal can buy not only...
3 weeks agoE-mail is the middle ground between a safe and a dumpster. How to fix it?
"Email is one of the oldest and most boring web technologies that most users prefer...
1 month agoTaiwanese investigative journalist Jason Liu visits Vitaly Moroz
eQtalk is the original content of the eQtv channel. In the frame, a representative of...
2 months agoWhy is it important for organizations to establish cooperation with CERT-UA in advance?
How to establish cooperation with CERT-UA for effective protection against cyberattacks. Team leader Evgeniya Nakonechnaya...
2 months agoWar and Cyber: Three Years of Struggle and Lessons for Global Security
Experts from the State Service of Special Communications and Information Protection of Ukraine, in conjunction...
3 months agoCERT-UA interaction with organizations: what is the most difficult?
CERT-UA helps public and private organizations strengthen cyber defenses and prevent attacks. The team encourages...
3 months agoWhy is Ukraine's experience in countering Russian hackers important for other countries?
Ukraine confronts Russian cyberattacks on a daily basis, gaining unique practical experience. A CERT-UA specialist...
3 months agoCyberspace Defense: How does CERT-UA interact with international organizations?
CERT-UA cooperates with international cyber incident response teams to effectively protect cyberspace. These teams are...
3 months agoHow does CERT-UA respond to cyber incidents?
What does CERT-UA do when an organization suffers from a cyberattack? Deputy Head Evgeniy Bryksin...
3 months agoDo organizations need cybersecurity specialists?
To strengthen cybersecurity, it is important for organizations to engage specialized specialists. Evgeniya Nakonechnaya from...
3 months agoWhen to contact CERT-UA and when to contact the cyber police?
How to distinguish phishing from real government programs and where to go in case of...
3 months agoWhat do CERT-UA specialists do?
CERT-UA investigates cyber incidents, prevents attacks, and strengthens the cybersecurity of Ukrainian organizations. Deputy Team...
3 months agoWhat is system integration and why it is so important in the era of cyberattacks. Interview with Seeton
"Interview with Sergey Prinev, CEO of Seeton, one of the leaders in the system integration...
3 months ago“My acquaintances almost 'hacked' the Leningrad nuclear power plant.” Andrei Perevezii, independent cyber expert
Andriy Perevezii, an independent cybersecurity expert and founder of the information security audit company Disl.Tech,...
3 months agoCyber expert Alexander Galushchenko: cyber warfare, cyber criminals, cyber attacks
"Oleksandr Galushchenko, cybersecurity specialist and co-founder of the Ukrainian Cyber Alliance. A conversation about the...
3 months agoHarmful advice: watch this video and do the opposite
Today and only today you have a unique opportunity to refuse to protect your data...
3 months ago