Expert Roundup: Is Internet Security a Losing Battle? 30+ cyber security experts share their insights on our chances to succeed against cybercrime
LAST UPDATED ON DECEMBER 7, 2016
72 min
SLOW READ
Let's get started!
ANDRA ZAHARIA (https://heimdalsecurity.com/blog/author/andra/)
A while ago, one of our readers asked us to answer the following questions:
SECURITY EVANGELIST
(http://twitter.com/AndraZaharia) (https://www.linkedin.com/in/andrazaharia)
That reader is certainly not the only one with this issue on his mind. Many Internet users f
Naturally, users like you and me are not the only ones who wrestle this dilemma. Wi claim to have the full picture.
That is why we reached out to some of the most experienced cyber security specialists in
These answers will help clarify some of the challenges we’re facing and I believe they’ll a you (https://heimdalsecurity.com/en/media-center)!
Here’s a quick list of links that point to all the answers in the roundup, if you need to find t Alexandre Campos – IT Security Professional Alexandru Stoian – CERT-RO Andrei Avădănei – Bit Sentinel, DefCamp Andrei Petruș – Avira Andy Patel – F-Secure Arosha K. Bandara – The Open University Brian Beyst – MyAppSecurity Brian Donohue – Cyber4Sight Claus Houmann – Peerlyst Cody Jackson – Inflow NS Dave Piscitello – Geneva Centre for Security Policy, ICANN David Bisson – Tripwire David Harley – ESET David Strom – Security Evangelist Inbar Raz – PerimeterX Inc. Jeff M. Spivey – ISACA, Security Risk Management, Inc. Joaquín Pérez Ruiz – IT Control & Risk Manager Kevin Townsend – Cyber Security Journalist Lawrence Abrams – Bleeping Computer Liviu Arsene – Bitdefender Mădălin Dogaru – Sentientchip Matthew Rosenquist – Intel Corporation Morten Kjaersgaard –Heimdal Security Neil Kemp – Network & Security Limited Pavel Krčma – Sticky Password Peter Kruse – CSIS Security Group Pierluigi Paganini – Bit4ld, ENISA, Security Affairs Raul Popa – TypingDNA Ryan J. Corey – Cybrary Sergiu Sechel – EY IT Advisory Services Stan Hanks – Columbia Ventures Corp Ștefan Tănase – Kaspersky Lab Global Research & Analysis Team Tony Perez – Sucuri Security
Before you start reading, you should know that you’ll be able to download a PDF with the
Alexandre Campos
PROFESSOR, SOFTWARE DEVELOPER AND IT SECURITY PROFESSIONAL (QUORA (HTTPS://WWW
(https://heimdalsecurity.com/blog/wp-content/uploads/Alexan
Absolutely not. But it’s a hard battle that will never have an end s The point is:
Companies should understand how important is to keep a Security Team inside only
Technology users (any technology user) should have in mind that they are the weake
Costs are not low and if the company does not have enough financial resources to fix
Alexandru Stoian
SECURITY CONSULTANT & DEVELOPER AT (HTTPS://CERT.RO/)CERT-RO (HTTPS://CERT.RO/) (TWI
(https://heimdalsecurity.com/blog/wp-content/uploads/CERT-
The question you asked has a relatively simple answer. The chal
Consequently, the battle against the Internet’s “insecurity” is simila
For any company that’s involved in the cyber security industry, the goal is not to eliminate Read the full text
Andrei Avădănei
CEO AT (HTTPS://BIT-SENTINEL.COM/)BIT SENTINEL (HTTPS://BIT-SENTINEL.COM/), FOUNDER AT
(https://heimdalsecurity.com/blog/wp-content/uploads/andrei
Absolutely not. But it’s a never-ending story because of the eme
Humans develop technologies and sometimes there is managem
the risks and impact of security incidents and not completely remo Read the full text
Andrei Petruș
PRODUCT MANAGER AT (HTTP://WWW.AVIRA.COM/)AVIRA (HTTP://WWW.AVIRA.COM/) (TWITTER (H
(https://heimdalsecurity.com/blog/wp-content/uploads/ANDR Maybe the question is wrong.
First, let’s accept the Internet is a key enabler that took us on the e
Second, we need to understand that progress is built on our capacity to adopt and galvan
Now we are prepared to ask it the right way: “If it wasn’t for the internet security ind Read the full text
Andy Patel
CYBER GANDALF AT F-SECURE (BLOGPOSTS (HTTPS://LABSBLOG.F-SECURE.COM/AUTHOR/ANDY
(https://heimdalsecurity.com/blog/wp-content/uploads/andy-p No. But that depends on what you mean by “The Internet.”
Ask the average individual “what is the Internet?” and you’ll likely
Security will drive parts of this evolution – things that are harder to
have their own versions of services that others use. Internet balka
Dr. Arosha K. Bandara
SENIOR LECTURER IN COMPUTING AT (HTTPS://WWW.FUTURELEARN.COM/PROFILES/278932)THE
(HTTPS://WWW.LINKEDIN.COM/IN/AKBANDARA), (HTTP://WWW.ACADEMIC-MARGINALIA.ORG/)PERS
(https://heimdalsecurity.com/blog/wp-content/uploads/Arosh
It is now common to see a deluge of news stories reporting on a ra
data by hacking into online service providers’ systems (http://www
From this, it seems obvious to conclude that the attackers are win
cybercriminals (https://www.fbi.gov/news/stories/joint-cyber-op
also undervalues the advances in technology and processes, as well as the growth in kno Read the full text
Brian Beyst
SENIOR DIRECTOR OF MARKETING AT (HTTP://MYAPPSECURITY.COM/)MYAPPSECURITY (HTTP://M
(https://heimdalsecurity.com/blog/wp-content/uploads/Brian-B
From a defense-oriented security posture, yes, it is a losing battle.
(https://www.peerlyst.com/search/posts?tags=attack)attack (h
The key to getting ahead of the (https://www.peerlyst.com/sea
1. Understanding the (https://www.peerlyst.com/search/posts
tags=applications)applications (https://www.peerlyst.com/sea
2. Understanding the means, motive, and opportunities of the attackers – this is significa
(https://www.peerlyst.com/search/posts?tags=profile) name, it involves understanding
3. Understanding what it is you’re trying to protect – the (https://www.peerlyst.com/sea capabilities which can be reached through the applications and IT system.
Understanding these three areas allows security to prioritize their defenses and proactive
This can only be achieved through a matured (https://www.peerlyst.com/tags/threat-mo
(https://www.peerlyst.com/search/posts?tags=devops)DevOps (https://www.peerlys
(https://www.peerlyst.com/search/posts?tags=resources)resources (https://www.pe
THEN (https://www.peerlyst.com/products/internet-security)Internet Security (https:
(https://www.peerlyst.com/search/posts?tags=vulnerabilities)vulnerabilities (https:/
Is Internet security a losing battle? Find out from th text=Is+Internet+security+a+losing+battle%3F+Find internet-security-a-losing-battle/)
CLICK TO TWEET (HTTPS://TW
Brian Donohue
JOURNALIST AND THREAT INTELLIGENCE ANALYST AT (HTTP://WWW.BOOZALLEN.COM/CONSULT
(HTTPS://WWW.LINKEDIN.COM/IN/BRIAN-DONOHUE-403A4520)LINKEDIN (HTTPS://WWW.LINKEDIN.C
If Internet Security is a Losing Battle, Then We Should All Jus
(https://heimdalsecurity.com/blog/wp-content/uploads/BRIAN
Simply put, if we’re going to have a constructive conversation abo
of continuing the fight is greater than the costs associated with giv
However, with Internet security, the equation becomes more comp
devastating cyber attacks, by and large, the integrity of online tran
legitimate. Ultimately, if we could somehow quantify the legitimate
That said, there is a very real appearance of losing, but think about how much worse the a Essentially every defensive breakthrough is offset by an offensive one.
It may be the case that no matter how good we get at security, so to speak, the success ra
Claus Houmann
COMMUNITY MANAGER AT (HTTPS://WWW.PEERLYST.COM/)PEERLYST (HTTPS://WWW.PEERLYST
(https://heimdalsecurity.com/blog/wp-content/uploads/Claus-
The DHS Secretary Johnson yesterday saidȘ “Growing dependen secure it.
Is Internet security a losing battle?, you ask, and my answer will b Read the full text
Cody Jackson
SOFTWARE DESIGN ENGINEER AT (HTTP://INFLOW-NS.COM/)INFLOW NS (HTTP://INFLOW-NS.COM
In general, no. If you don’t keep up your defenses, then you have lost the battle. Whi
On the flip side, however, because a lot of organizations don’t take security seriously, the else.
So, it will be a never-ending battle, at least until a new Internet design is developed that
Dave Piscitello
ASSOCIATE FELLOW AT (HTTP://WWW.GCSP.CH/)GENEVA CENTRE FOR SECURITY POLICY (HTTP
(https://heimdalsecurity.com/blog/wp-content/uploads/dave-p
Any battle that you engage on your enemy’s terms, with indefensi
However, I’m not certain that warfare remains the right analog for
The devices and software that comprise the Internet are o
Their immune systems are weak (e.g., poorly designed, lacking secure code review
They are premature, we know it, and we persist in imagining that persistent incubati
The people who use devices and software are largely not care providers nor did advantages the Internet offers, perhaps irrespective of the degree of risk.
The biggest challenge with Internet health is that the organisms change at a faster r
organisms. We are effectively nurturing an unhealthy ecosystem and in tandem, nurturing
I think we’d need to pause, thoughtfully design “healthy” devices or software. We n
David Bisson
ASSOCIATE EDITOR AT (HTTPS://WWW.TRIPWIRE.COM/)TRIPWIRE (HTTPS://WWW.TRIPWIRE.COM
(https://heimdalsecurity.com/blog/wp-content/uploads/david-
Internet security is a losing battle only if you look at security i threats and working through effective mitigation strategies.
Now, sometimes the proliferation of threats might seem a bit overw
vulnerabilities to gain access to an organization’s network. Today
In this light, Internet security is all about understanding how you can best leverage y
create a vulnerability management program under which endpoint detection and respons
It’s impossible to stay on top of ALL threats. But as long as we continue to think, ad
Can you win the fight against #cybercriminals? See text=Can+you+win+the+fight+against+%23cybercrim roundup-is-internet-security-a-losing-battle/)
CLICK TO TWEET (HTTPS://TWITTER.COM
David Harley
SENIOR RESEARCH FELLOW AT (HTTPS://WWW.ESET.COM/)ESET (HTTPS://WWW.ESET.COM/) (TW
(https://heimdalsecurity.com/blog/wp-content/uploads/DAVID
It depends on what you expect to be achieved, in terms of security
Internet security is an attempt to solve a number of social pro
The security industry is pretty good at providing a wide range of partial solutions to a wide
which I’m responding echoes a widespread feeling that ‘Since the security problem can’t Read the full text
David Strom
EDITOR AT INSIDE SECURITY (HTTPS://INSIDE.COM/SECURITY), IT JOURNALIST, BUSINESS CONS
(https://heimdalsecurity.com/blog/wp-content/uploads/david-
I have been writing about Internet security for decades, and one o
time, have the tools, and understand the right techniques to fight it
The key thought: you need to fight this battle on the right front
Ten steps to improve your wireless home networks (https://heimdalsecurity.com
Detecting phishing email campaigns through LinkedIn (https://heimdalsecurity.c
How to backup your devices (https://heimdalsecurity.com/blog/how-to-backup-y
Improve your privacy on LinkedIn and other social media accounts (https://heim
Recognize and avoid these common scams (https://heimdalsecurity.com/blog/to
Strengthen and improve your passwords (https://heimdalsecurity.com/blog/pas
Taken together, this all may seem overwhelming and a lot of reading. It is. But use these a consuming. Read the full text
Inbar Raz
PRINCIPAL RESEARCHER AT (HTTPS://WWW.PERIMETERX.COM/)PERIMETERX INC. (HTTPS://WWW
(https://heimdalsecurity.com/blog/wp-content/uploads/inbar-r
The Internet as we know it is not very old. The World Wide Web w
when we say “Internet Security” today it means a lot more. The ter
How it’s built
If to make a generalization, then today we are no longer looking at particular items in an o Read the full text
Jeff M. Spivey
CRISC, CPP, BOARD DIRECTOR OF (HTTPS://WWW.ISACA.ORG/PAGES/DEFAULT.ASPX)ISACA (HTT (HTTPS://WWW.LINKEDIN.COM/IN/JEFFSPIVEY))
(https://heimdalsecurity.com/blog/wp-content/uploads/Jeff-Sp
Internet security is not a “losing battle” but I suggest it is a long
and dynamic understanding of threats, vulnerabilities and risk ma
The threatscape is so dynamic that one-off solutions relating only Read the full text
Joaquín Pérez Ruiz IT CONTROL & RISK MANAGER (LINKEDIN (HTTPS://WWW.LINKEDIN.COM/IN/JPR1981))
(https://heimdalsecurity.com/blog/wp-content/uploads/Joaqu
Nowadays, it is fairly common to hear about a company that has b
We could think that cyber security is something applicable only to
soon as they find one (that could be your phone, smart TV, home Read the full text
Kevin Townsend
FREELANCE JOURNALIST AND WRITER WITH MORE THAN 10 YEARS’ EXPERIENCE IN WRITING AB
Is internet security a losing battle ?– A consumer’s perspectiv
(https://heimdalsecurity.com/blog/wp-content/uploads/KEVIN
Internet security is not a losing battle; it is a continuing battle
steps to reduce the likelihood of it happening to us. We canno
In the physical world, there is a police concept called CPTED: Cri
take care to be burgled. By adopting a similar approach to our ow On the internet, there are three types of attacker that we must at least be aware of: the simple criminal who steals our data for profit; the software vendor who openly or covertly takes our data for profit; and the governments who take our data for control purposes. All three require a different response:
criminal: up to date anti-virus; install all patches as they become available; don’t clic
minimal funds for online shopping and check for the padlock icon; choose cloud storage w
software vendor: there’s not much we can do here, but use reliable app stores, read
government: and there’s even less we can do here, assuming we actually want to. D
None of this will guarantee our safety on the internet – but in combination, they will keep m
Lawrence Abrams
OWNER AT (HTTP://WWW.BLEEPINGCOMPUTER.COM/)BLEEPING COMPUTER (HTTP://WWW.BLEEP
(https://heimdalsecurity.com/blog/wp-content/uploads/Lawren
Security is only a losing battle if someone allows it. I think any So what should an individual do to protect themselves?
1. If you use Windows, you should do is enable the viewing of f
not see file extensions by default. This allows malware executable
2. Use a unique password at every site you visit. We hear almost every day about la manager to keep track of the unique passwords that are used at each site.
3. Do not open attachments you receive via email without confirming with the sen it and scan it with a service like VirusTotal before you open it.
4. Do not use weak passwords. I know it’s easier to use 123456 as your password, bu
5. Use 2 Factor authentication to secure your online accounts. 2 Factor authenticat
6. Last, but not least, be careful what you download from the Internet. Many free prog not installing something unwanted as well.
If you follow these steps, your computer and network will be safe, and you will actually wi
Liviu Arsene
SENIOR E-THREAT ANALYST AT (HTTP://WWW.BITDEFENDER.RO/)BITDEFENDER (HTTP://WWW.BIT
(https://heimdalsecurity.com/blog/wp-content/uploads/Liviu-A
Securing the internet is not a losing battle as long as we want
Granted, the rapid pace at which we adopt new technologies and
For instance, new technologies can be developed to secure the e
Simply giving up and saying that securing this expanding interconnected infrastructure, w
The internet is vital and the more it expands, the more we need to make sure that data, se
Mădălin Dogaru
CEO & FOUNDER AT (HTTP://SENTIENTCHIP.COM/)SENTIENTCHIP (HTTP://SENTIENTCHIP.COM/) (L
(https://heimdalsecurity.com/blog/wp-content/uploads/madali
This is a very difficult question as there is no easy answer. To be
Birth of the Internet
The first form of a primitive Internet appeared in 1969 and it was named ARPANET (initia
Later in 1982, the TCP/IP Internet protocol suite became the standard networking protoco Read the full text
Matthew Rosenquist
CYBERSECURITY STRATEGIST AND EVANGELIST AT (HTTP://WWW.INTEL.COM/CONTENT/WWW/US
(HTTPS://WWW.LINKEDIN.COM/IN/MATTHEWROSENQUIST)LINKEDIN (HTTPS://WWW.LINKEDIN.COM
3 Reasons Why is Cybersecurity Losing
(https://heimdalsecurity.com/blog/wp-content/uploads/matthe
Cyber threats are currently outpacing the defenders but it does no
causes, we can adapt and change the equation for everyone’s be
There are three aspects which are contributing to security cu 1. Rapid growth and importance of the technology landscape in people’s lives 2. Rising complexity, costs, and organizational challenges for defenders 3. The improvement of attacker’s tools, capabilities, and collaboration.
Combined, this situation creates an environment like a perfect storm, enabling the threats
usability of technology are at an acceptable level for our security, safety, and privacy. It is
RAPID GROWTH AND IMPORTANCE OF THE TECHNOLOGY LANDSCAPE
The Internet is getting crowded with the proliferation of new users, devices, and usages. O
will sprout up to meet the demands and take advantage of these new markets. In the rush Read the full text
Morten Kjaersgaard
CEO AT (HTTPS://HEIMDALSECURITY.COM/EN/)HEIMDAL SECURITY (HTTPS://HEIMDALSECURITY.C
(https://heimdalsecurity.com/blog/wp-content/uploads/Morten
Whether internet security is a losing battle or not is very hard to an
The invention of the automobile being a very simple example. No The same has happened on the internet.
The car industry was in many ways legally forced to adapt, at leas I foresee the same will happen with the Internet and the security space surrounding it. The EU GDPR (General Data Protection Regulation) being the first big move in Europe.
Legislation will slowly force companies to ensure themselves better and naturally if you a A Mercedes Benz E Class is just safer than a SsangYong Tivoli.
Those choosing to try and reap the benefits of the internet also need to try and pro
therefore hold credit cards, social security numbers and so forth, then of course, then regu
Taking the global view, the problem will of course be, that the Internet is global and
Internet Security is indeed a battlefield – but I don’t think it will ever go either way entirely
Can we win the battle against cybercriminals? 30+ text=Can+we+win+the+battle+against+cybercrimina roundup-is-internet-security-a-losing-battle/)
CLICK TO TWEET (HTTPS://TWITTER.COM/SHAR
Neil Kemp
SECURITY CONSULTANT AT NETWORK & SECURITY LIMITED (HTTPS://WWW.NETWORKANDSECUR
Is Internet Security a Losing Battle? No. It’s a War – Not a Batt
(https://heimdalsecurity.com/blog/wp-content/uploads/Neil-Ke
Quite a lot of businesses today approach Internet Security as a on
solved, but a Business issue and have oversight, and more impor
Businesses today need to adopt the strategy that Internet Security
There are new threats and issues that appear every day. Some of these battles will be los
A PROACTIVE SECURITY STRATEGY
Security Prevention is the best policy. Don’t wait until you’re hacked or breached to im breach. Read the full text
Pavel Krčma
CTO AT (HTTPS://WWW.STICKYPASSWORD.COM/)STICKY PASSWORD (HTTPS://WWW.STICKYPASS
(https://heimdalsecurity.com/blog/wp-content/uploads/Pavel-
I don‘t think that internet security is a losing battle. The battle
I think the situation will stay the same until society opens up to acc
the whole ecosystem (for example, via forcing vendors to include
It’s like we are somehow stuck in the ‘80s when ideas of unlimited enforcement.
Peter Kruse
FOUNDER AT (HTTPS://CSIS.DK/)CSIS SECURITY GROUP (HTTPS://CSIS.DK/) (TWITTER (HTTPS://TW
(https://heimdalsecurity.com/blog/wp-content/uploads/Peter-K
First of all, we are not winning. At least not yet. Having said th
Let’s begin with the end user – an ordinary internet user still clic
and third party products only leads to data loss or financial crime. Read the full text
Pierluigi Paganini
CIO AT (HTTP://WWW.BIT4ID.COM/EN/)BIT4LD (HTTP://WWW.BIT4ID.COM/EN/), MEMBER OF ENISA & (HTTPS://WWW.LINKEDIN.COM/IN/PIERLUIGIPAGANINI))
(https://heimdalsecurity.com/blog/wp-content/uploads/PIERL
First of all, we have to contextualize the discussion. We are assist
If you think of the Internet such as a “global commodity,” you cann
What we can do in this historic phase is start spreading a security
We urge more information sharing on cyber threats and we need a global acceptan
Raul Popa
CEO AND DATA SCIENTIST AT (HTTPS://TYPINGDNA.COM/)TYPINGDNA (HTTPS://TYPINGDNA.COM/
(https://heimdalsecurity.com/blog/wp-content/uploads/raul-po
I think Internet security is a large category and there are lots of sec latter.
The Internet, as a whole hasn’t been designed for what it is today,
Typically, there are 3 major types of frauds and security issues by the point of attack: clien
First thing: everybody should fix their connection, use a firewall, use https, email should b Read the full text
Ryan J. Corey
CO-FOUNDER AT (HTTPS://WWW.CYBRARY.IT/)CYBRARY (HTTPS://WWW.CYBRARY.IT/) (TWITTER (
(https://heimdalsecurity.com/blog/wp-content/uploads/ryan-c
I don’t necessarily think that internet security is a losing battle
adhering to a practice that informs their employees about the lates worse.
In regards to the long term, I believe things will get much better in
Furthermore, venture capitalists are pouring a lot of money into cy
Sergiu Sechel
SENIOR ADVISOR – IT ADVISORY SERVICES AT (HTTP://WWW.EY.COM/)EY (HTTP://WWW.EY.COM/
(https://heimdalsecurity.com/blog/wp-content/uploads/Sergiu
Is Internet security a losing battle? It is a difficult question and I do
“Internet” we are trying to secure provides just a set of communica
be updated, but in general the Internet protocols, configured corre
People reading the opinions given above will argue that just last m
because of poor security configuration of millions of IoT devices because after deploymen Read the full text
Stan Hanks
CHIEF TECHNOLOGIST AT (HTTP://COLVENTURES.COM/)COLUMBIA VENTURES CORP (HTTP://COL
We’re Doing This All Wrong
(https://heimdalsecurity.com/blog/wp-content/uploads/stan-h
I’ve been working in network security since the early 1980s, have
Let’s look at the history of keeping secrets and managing confiden
All of what we think of as “information security” has its roots in this – the management of p you both don’t violate the policies and to intercede if you do.
That worked really pretty well, until the advent of xerographic copiers; at that point, the rul
By the mid-80s, when it became clear that networks were going to be a thing and that com largely the problem. Read the full text
Ștefan Tănase
SENIOR SECURITY RESEARCHER AT (HTTPS://ME-EN.KASPERSKY.COM/ABOUT/TEAM)KASPERSK
(https://heimdalsecurity.com/blog/wp-content/uploads/stefan
Internet security is more like an ongoing battle than a losing b
However, security solutions do offer reliable protection for private Internet is highly recommended for private users.
Businesses too need to change their approach. The growing com later for renewal. This is not working anymore.
Although it would be easier for everybody – security companies and businesses –
But it works for both enterprises as well as small companies that could become victims of
Last, but not least, one more thought on Internet security: you can achieve it withou
Tony Perez
CEO AT (HTTPS://SUCURI.NET/)SUCURI SECURITY (HTTPS://SUCURI.NET/) (TWITTER (HTTPS://TWIT
(https://heimdalsecurity.com/blog/wp-content/uploads/Tony-P
Of course not! That’s like saying: well there is crime, let’s just do
The security challenges that the internet presents us today are sim
comes from years and years of trials and tribulations, had they sto
the process, we’ve seen huge improvements (relatively speaking)
There is no denying however that we do find ourselves in a precarious position today with
that were considered to be relatively stable. Now introduce this desire for everything to be
We’ve already started to see some of the challenges this introduces. We’ve seen critical i today’s security threats.
With that being said, I would never give up or say that we’re at such a point that we s
lot. Interesting enough, the greatest challenge I see is not the security threats, but rather th
bureaucracy. It’s not that we’re not able to combat today’s challenges, it’s that we’re not w
Conclusion
I hope you’ve enjoyed reading this roundup and kudos for making it this far (this is the len
A big thank you for all the experts who lent their time and experience so that we can all g
As promised, you can download a PDF of the entire roundup just [thrive_2step id=’9135¢]
The fight against cybercrime continues and I hope these perspectives will help you better
Enter your email address
Heimdal FREE
Keep your apps up to date automatically and silently
DOWNLOAD IT FOR FREE
(https://heimdalsecurity.com/en/products/heimdal free/thank-you)
(HTTPS://HEIMDALSECURITY.COM/BLOG)
PRODUCTS
FREE SECURITY RESOURCES
COMPANY
HEIMDAL FREE
CYBER SECURITY COURSE FOR BEGINNERS
ABOUT HEIMDAL
(HTTPS://HEIMDALSECURITY.COM/EN/PRODUCTS/HEIMDAL(HTTP://CYBERSECURITYCOURSE.CO/)
(HTTPS://HEIMDALSECURITY.COM/EN/ABOUT)
FREE)
THE ULTIMATE WINDOWS 10 SECURITY
MEDIA CENTER
HEIMDAL PRO
GUIDE
(HTTPS://HEIMDALSECURITY.COM/EN/MEDIA-
(HTTPS://HEIMDALSECURITY.COM/EN/PRODUCTS/HEIMDAL(HTTPS://HEIMDALSECURITY.COM/EN/WINDOWS-
CENTER)
PRO)
10-SECURITY-GUIDE)
PARTNER WITH US
HEIMDAL CORP
CYBER SECURITY GLOSSARY
(HTTPS://HEIMDALSECURITY.COM/EN/PARTNER-
(HTTPS://HEIMDALSECURITY.COM/EN/PRODUCTS/HEIMDAL(HTTPS://HEIMDALSECURITY.COM/GLOSSARY) CORP)
THE DAILY SECURITY TIP
PRODUCT COMPARISON
(HTTPS://DAILYSECURITYTIPS.COM/)
(HTTPS://HEIMDALSECURITY.COM/EN/PRODUCTS)
CYBER SECURITY FOR SMALL BUSINESS OWNERS (HTTPS://LEARNINFOSEC.CO.UK/)
©2014 - 2017 Heimdal Security • VAT nr. 35802495 • Vestergade 2 • 1456 København K
[email protected] (mailto:
[email protected])
Your e-mail ...
SUBSCRIBE TO OUR BLOG
WITH-US)