en

Datami Blog: Cybersecurity News and Articles

Trending

Cybersecurity News from Datami
Cybersecurity News from Datami
17.1K Views
Ranking the Best Secure Browsers with VPN: Key Privacy, Security, and Performance Insights
Nov 14, 2024
Oleksandr Filipov - Cybersecurity Author
Oleksandr Filipov - Cybersecurity Author
6.3K Views
Penetration Testing Results: What Do You Need to Know About a Pentest Report?
Feb 17, 2025
Oleksandr Filipov - Cybersecurity Author
Oleksandr Filipov - Cybersecurity Author
22.5K Views
Penetration Testing Execution Standard: Benefits and 7 Essential Stages
Feb 27, 2025
Oleksandr Filipov - Cybersecurity Author
Oleksandr Filipov - Cybersecurity Author
5.9K Views
Effective Penetration Testing Plan: 8 Steps to Reliable Security
Feb 27, 2025

Discover the topics:

Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice Oleksandr Filipov - Cybersecurity Author
Oleksandr Filipov - Cybersecurity Author
Types of Cybersecurity Vulnerabilities: The Most Common and Critical from Datami’s Practice

In this article, we outline the main types of vulnerabilities. Based on the results of our projects, we have also compiled top lists of the most common and the most critical ones.

Mar 7, 2026 15 min
Davos Innovation Week 2026: Crypto and Security Without Compromise Cybersecurity News from Datami
Cybersecurity News from Datami
Davos Innovation Week 2026: Crypto and Security Without Compromise

The Datami team took part in Davos Innovation Week 2026, which took place on January 19–23, and presented its expertise. Datami CGO Oleksii Lavrenchuk delivered a talk on the transformation of cyber risks.

Mar 4, 2026 15 min
Information Security: Types of Threats and Methods of Mitigation Cybersecurity News from Datami
Cybersecurity News from Datami
Information Security: Types of Threats and Methods of Mitigation

Information security encompasses methods for protecting data from threats that can harm individuals or companies, and it requires continuous improvement due to the evolving technologies of criminals.

Nov 14, 2024
Smartphone Security and Cybersecurity Cybersecurity News from Datami
Cybersecurity News from Datami
Smartphone Security and Cybersecurity

Smartphone security is important, as the increase in their usage comes with the risks of data breaches, so users should adhere to basic protection rules, such as updating software and using complex passwords.

Nov 14, 2024
What Is Cloudflare? Pros & Cons You Should Know Cybersecurity News from Datami
Cybersecurity News from Datami
What Is Cloudflare? Pros & Cons You Should Know

Cloudflare provides robust protection and optimization for websites, but it also carries risks such as security threats and reliance on a single vendor, highlighting the importance of a comprehensive approach to information security.

Nov 12, 2024
Dangerous Smartphone Apps You Should Delete Cybersecurity News from Datami
Cybersecurity News from Datami
Dangerous Smartphone Apps You Should Delete

Malicious apps for Android can steal data, track geolocation, and display unwanted advertisements, so it is important to remove them from devices to ensure security.

Nov 14, 2024
Top Cybersecurity Books to Read Cybersecurity News from Datami
Cybersecurity News from Datami
Top Cybersecurity Books to Read

The best cybersecurity books for ethical hacking, Web3 security, and protecting personal data.

Nov 13, 2024
What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers? Oleksandr Filipov - Cybersecurity Author
Oleksandr Filipov - Cybersecurity Author
What is Penetration Testing, or How Can You Avoid Being Caught Off Guard by Hackers?

Penetration test definition and types. The key steps penetration testers take during different pentestings and how it helps companies improve their overall cybersecurity resilience

Dec 9, 2024
Order a consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy