About Sead Fadilpašić
Sead is a seasoned journalist with more than 15 years of experience. He loves writing about cybersecurity and the blockchain, which he's been following closely since 2017. He spends his free time with his two daughters.
Sead has a university degree in Journalism and Public Relations, and has passed HubSpot's course on Inbound Marketing, as well as Udemy's course on SEO.
Why Sharks Are Serious Cybersecurity Risks (Yes, Sharks)
Let’s dive into the depths of cybersecurity's most unusual threat: sharks. Yes, you read that right.
How to Create a Successful Cybersecurity Risk Awareness Campaign
Creating a resilient cybersecurity culture starts with raising awareness.
Why Your Customers Trust You More When You Prioritize Cybersecurity
We all prefer to do business with companies we believe will keep our data safe.
How to Make Sure Your WordPress Website Is Secure
Don't leave your WordPress site vulnerable in the world of ever-evolving cyber threats. Here's how to check your blog and keep it secure.
In-Office vs. Remote vs. Hybrid Work: Which is Best for Cybersecurity?
Is one approach to work safer than all the others?
How to Ensure You’re Not Being Scammed When Buying a Domain Name
Keep your investments secure with a simple guide to scam-free domain purchases.
How to Protect Your Online Store from Cyberattacks?
Bulletproof your e-commerce store and make sure you're a step ahead of cybercriminals.
What Is AI Decision-Making in Cybersecurity and Can We Trust It?
Can AI help us eliminate human error, or does it only adds to the threat?
What Is DevSecOps and Why Is It Important?
Although we all agree that app security is serious stuff, it’s often overlooked in software development. DevSecOps aims to correct that.
Are the Climate Change Crisis and Rise of Cyberattacks Intertwined?
Extreme weather events, rising seas, and the loss of the Arctic are giving rise to cyberattacks worldwide. Here's how and why.
5 Secure Password Alternatives You Should Consider
If a hacker founds out your login credentials, they could access all your data. So if passwords are the problem, how can we go passwordless?
Centralized vs. Decentralized Identity Management Models: Which Is Better for Security?
Identity management models determine where data is stored and shared, so which is better: a centralized or decentralized model type?
6 Reasons Why Supply Chain Attacks Are on the Rise
Such attacks are becoming a major headache for cybersecurity teams, and countering them is a massive challenge.
Zero Trust vs. Zero-Knowledge: What’s the Difference?
These two security concepts may sound similar but they’re completely different.
What Are Adversarial Attacks in Machine Learning and How Can We Fight Them?
You might've heard of adversarial attacks in relation to artificial intelligence and machine learning, but what are they? What are their aims?
What Is Zero-Knowledge Security and Why Is It Critical Today?
End-to-end encryption has paved the way for zero-knowledge security, but there’s more to it.
How Hackers Use Generative AI in Their Attacks and What We Can Do About It
Generative AI is a double-edged sword used for offense and defense against cybercrime.
Is the Use of AI in Cybersecurity Making the World More Secure?
While the pros of utilizing AI in cybersecurity may outweigh the cons, AI is still adding to cyber threats.
Is Data Stored in the Cloud Secure?
While no security system is fool-proof, thanks to encryption, redundancy, and 24/7 monitoring, your data should stay on the safe side of the cloud.
256-Bit AES vs. XChaCha20: Which Is More Secure?
The good old AES is still considered a golden standard for online security while XChaCha20 is simpler, faster, and future-proof.