Web search in late 90x, total fun – that required luck and skill. Search algorithms back then used to be based on exact words matching and presented based on resource popularity and number of cross-references. Btw today’s search engine provides you with information that the algorithm considers being your intend...
Continue reading...Cyber security
Empower your M&A activity with Open Source Intelligence (OSINT) techniques
Exploring unconventional ways to empower M&A due-diligence process using Open Source Intelligence (OSINT)
Continue reading...Cyber threatens M&A deals
Cyber-attacks are a big deal in today’s world, and many already had an impact on Mergers & Acquisitions (M&A). I put together a brief post illustrating recent examples of the impact and emphasize the importance of the Cyber due diligence during M&A process…
One of the key risks to assess is if cyber-attack have taken place without the target’s awareness and without the acquirer’s knowledge.
Continue reading...Making sense out of Quantum Computing
Quantum Computing (QC) attracting media attention. Google and IBM are claiming success in overcoming technological constrains and getting closer to the functioning prototypes. Gartner research suggests that through 2023, 20% of the organizations would have some budget allocations (directly or indirectly) hitting Quantum Computing projects. So, what is it, how...
Continue reading...Bye-bye DPI
Server-less internet censorship circumvention that does not use third-party servers and does not affect the internet connection speed. No secret that many enterprises, service providers and governments do implement Deep Packet Inspection (DPI) solutions to filter-out blacklisted contents and or address other cybersecurity concerns. Many might come across access restrictions...
Continue reading...