Alex Vakulov Alex Vakulov is a cybersecurity researcher with over 20 years of experience in malware analysis. Alex has strong malware removal skills. He is writing for numerous tech-related publications sharing his security experience.
Alex Vakulov
How to Streamline the Vulnerability Management Life Cycle
Alex Vakulov | | Information Security, software-vulnerabilities, System Vulnerabilities, vulnerability, Vulnerability Management
Establishing a vulnerability management process is a crucial part of an organization's cybersecurity strategy and demands thoughtful planning ... Read More
Security Boulevard
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security
Alex Vakulov | | Cybersecurity, Data breaches, Data Loss Prevention, data protection, DLP, personal data
DLP plays an important role, but it's not the only necessary component in a robust data protection strategy ... Read More
Security Boulevard
The Intricacies of Constructing an Efficient Security Operations Center
Alex Vakulov | | Cybersecurity, information security service providers, security operations, Security Operations Center, SOC, SOC Pilot Project
Plenty of organizations are considering setting up their own security operations center (SOC). The prospect of having the entire infrastructure under the stringent scrutiny of information security monitoring is appealing – it is a strong line of defense against potential threats. However, the question of who will actually construct this ... Read More
Security Boulevard
Exploring the Flaws in Contactless Bank Card Security
Alex Vakulov | | Bank Cards Security, contactless payments security, Cybersecurity, Privacy, security, Security Awareness
Despite the convenience of contactless card payments, bank cards can be compromised through NFC technology ... Read More
Security Boulevard
Securing Remote Workers With Firewall-as-a-Service
In today’s era of remote and hybrid work, organizations continue to grapple with many cybersecurity questions. What solutions can help companies effectively and securely manage remote employees? Is it possible to protect network traffic using cloud computing? How have targeted cyberattacks and advanced persistent threats (APTs) influenced the development of ... Read More
Security Boulevard
How to Protect Corporate Mobile Devices
There are several essential questions organizations must answer with regard to the protection of corporate mobile devices. What threats do we protect work smartphones from? Which mobile operating systems are more secure? How do approaches to combat threats depend on the chosen policy—BYOD, COPE, CYOD? What tools and methods are ... Read More
Security Boulevard