Is Cybersecurity a Top Priority for Politicians? World Politics and Cybersecurity

Since 2020, the Covid-19 pandemic has re-shaped the way in which we all live and work. In February 2022 another context came forth to drive change, especially in the (cyber)security…

Heimdal™ Security Threat-Hunting Journal: End of the Year Wrap-up in Malware

Marking the end of 2021, Heimdal™ has enacted the very first entry of the Threat-Hunting journal, a blog section dedicated to the latest cybersecurity threats. The article and its findings…

The Best Twitter Cybersecurity Accounts You Should Follow [Updated 2021]

Security experts, researchers, and cyber enthusiasts abound on Twitter, eager to share their ideas, news, and research on information security, industry best practices, and the most recent dangers. If you’re…

What Is Privileged Account and Session Management (PASM)?

Privileged Account and Session Management (PASM) is a new PAM (Privileged Access Management) that focuses on privileged account monitoring and management for compliance, security, and data integrity purposes. Whereas PAM…

How to Use IP Geolocation in Threat Intelligence and Cybersecurity

Hacks, leaks, and phishing scams happen so often that they hardly register as news anymore. Just last week, Google warned of a phishing scam perpetrated by Fancy Bear, a hacking…

Top 7 Cybersecurity Trends for 2022

2020 and 2021 have been some truly revolutionary years and now that 2022 is only a few months away, you might wonder what’s going to happen next. In terms of…