Alex Vakulov

Alex Vakulov is a cybersecurity researcher with over 20 years of experience in malware analysis.

Sort By
Most Recent
Most Recent
Oldest
19 Articles
A young woman works on a laptop and writes in a notepad
With college costs soaring, students should consider these flexible methods for earning money online. Not only are they lucrative, but they also provide valuable career skills.
A businessman creates an AI avatar
AI avatars provide a human-like interface for a range of recruitment tasks. Our expert explains how they can streamline HR operations.
An image of a cloud with security icons
As multicloud deployments become more common, security threats are amplified. Our expert outlines how to stay ahead of the risks.
A laptop showing the WordPress logo
WordPress sites have some intrinsic vulnerabilities that make them tempting targets for attackers. Our expert offers tips on staying safe.
A computer screen shows a deepfake face being created.
The C2PA standard enables embedding metadata into images and other media content to verify the presence of AI.
An American football player is being tackled by defense on the field.
Cybersecurity teams need a good defense. Here’s how to find the players.
A person looking at images of a port on computer screens.
This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.
People in an office looking at colleagues who are on a video screen.
Remote work set up a collision course for candidates, who want to work from home, and employers, who’d rather have people in the office.
A person looking at a computer with suspicion.
An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.
A computer and social media. Companies must take steps to keep their social media accounts safe from hackers.
No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.
Zero Trust on a computer screen.Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.
Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.
A security room. Security operations centers, or SOCs, are vital for cybersecurity.
Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.