Tag: phone number database

Tof the Internet there is a wave of activity of malefactors after targete and DDoS attacks they decide to rely on ordinary employees Alexander Dvoryansky director of special projects at Angara Security believes: Mailing lists are also disguise as the most pressing private issues. So in the subject line of the letter there may be…

Said Maxim Pavlunin head of the Angara SOC monitoring center. The main principle of the eucational program of our college is a focus on the practical. Training of future specialists and the establishment of strong partnerships with companies from the industry. I would also like to note that information security is part of the program.…

Near future we plan to actively expand their number. We are one of the most flexible integrators in terms of introducing new solutions to the company’s product range. And we add to the portfolio not just a replacement for a specific solution in the form of a Russian product but we introduce the entire line…

Requires and their own client base. Roman Dzvinko (BusinessAvtomatika) is optimistic. Today the Russian market provides a full range of systems for automating organizations of any industry and scale. It will be more likely to speak about the shortage in the field of IT personnel since it may be difficult to use the services of…

Hat ensures the operation of critical functions in your company has cease to be update bugs are no longer fixe in it its functionality begins to lag behind the capabilities of similar products on the market without being update it carries increase information security risks – you can build work companies using such a solution?…

SAP a long-term leader in the Russian market of ERP systems. As a result of the sanctions updates and global support will not be available to Russian customers and contractors of SAP implementations. The departure of Western vendors will be less painful for those who have partially switche to Russian software says Roman Dzvinko Executive…

The first one is the infrastructure that is common for all large enterprises. There is already a shortage of infrastructure on which information systems are deploye. Due to sanctions the usual set of Western vendors and platforms is not available. The cloud resources that exist in the country are finite as are the reserves of…

Transformation Teams Boost Cyber ​​Literacy in the Public Sector. Angara Security in partnership with the Center for Training Leaders and Digital Transformation. Teams of the GSSU RANEPA conducte training on the topic Ensuring Information Security in the . Public Sector for representatives of government agencies from all over Russia. During the webinar the head of…

About himself from any resource whether it be a social network. or a taxi service said Dvoryansky from Angara Security. Therefore you can procee from the assumption that the data has already been leake and periodically check your accounts in public leak databases he suggests. Anonymity and security on the dark web In itself visiting…

Resources are locate. Tor was develope in the late s at the US Naval Research Laboratory for secure communications of intelligence agencies but then the project became open and now the Tor Project team is responsible for its development. Another service to enter the darknet is the IP network. This segment has significantly fewer resources…