Alex Vakulov

Alex Vakulov is a cybersecurity researcher with over 20 years of experience in malware analysis.

Sort By
Most Recent
Most Recent
Oldest
13 Articles
A person looking at images of a port on computer screens.
This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.
People in an office looking at colleagues who are on a video screen.
Remote work set up a collision course for candidates, who want to work from home, and employers, who’d rather have people in the office.
A person looking at a computer with suspicion.
An uptick in cybersecurity events might mean your employees need help in recognizing phishing scams.
A computer and social media. Companies must take steps to keep their social media accounts safe from hackers.
No one is safe from social media cyber attacks. Take these steps to keep your company’s accounts safe.
Zero Trust on a computer screen.Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.
Zero Trust applies continuous and rigorous scrutiny to each interaction, device, user, application and transaction.
A security room. Security operations centers, or SOCs, are vital for cybersecurity.
Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.
A hacker at a computer. XDR, or extended detection and response, can help detect and thwart cyberattacks.
XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.
An API symbol on a wooden block. API security is essential to
API is everywhere. Here’s how to minimize security risks.
A person looking at a mobile phone. Privacy and AI are changing the way marketers approach analytics.
Privacy and AI are changing the way marketers look at analytics.
A person reviewing red teaming simulation results. Red teaming assesses the effectiveness of a security operations center.
Red teaming assesses the effectiveness of a security operations center.
Data loss prevention systems help improve personnel security.
To start, they connect IT, HR and information-security teams.
Deception technology can thwart malefactors' attempts at cyberattacks..
It warns of attacks and help uncover a malefactor’s methods and intentions.