MakeUseOf

Sead Fadilpašić-Contributing Writer for Security

Sead Fadilpašić

Contributing Writer for Security

About Sead Fadilpašić

Sead is a seasoned journalist with more than 15 years of experience. He loves writing about cybersecurity and the blockchain, which he's been following closely since 2017. He spends his free time with his two daughters.

Sead has a university degree in Journalism and Public Relations, and has passed HubSpot's course on Inbound Marketing, as well as Udemy's course on SEO.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
sharks in inky black sea 1
Why Sharks Are Serious Cybersecurity Risks (Yes, Sharks)

Let’s dive into the depths of cybersecurity's most unusual threat: sharks. Yes, you read that right.

A man reading a book 1
How to Create a Successful Cybersecurity Risk Awareness Campaign

Creating a resilient cybersecurity culture starts with raising awareness.

Handshaking between a person from a laptop and in the office 1
Why Your Customers Trust You More When You Prioritize Cybersecurity

We all prefer to do business with companies we believe will keep our data safe.

Word security on a computer screen 1
How to Make Sure Your WordPress Website Is Secure

Don't leave your WordPress site vulnerable in the world of ever-evolving cyber threats. Here's how to check your blog and keep it secure.

Woman biting a pen in front of a laptop 1
In-Office vs. Remote vs. Hybrid Work: Which is Best for Cybersecurity?

Is one approach to work safer than all the others?

Man with hands behind head looking at laptop 1
How to Ensure You’re Not Being Scammed When Buying a Domain Name

Keep your investments secure with a simple guide to scam-free domain purchases.

Ecommerce street sign with green traffic lights at each side 1
How to Protect Your Online Store from Cyberattacks?

Bulletproof your e-commerce store and make sure you're a step ahead of cybercriminals.

Artificial intelligence presented in an abstract manner 1
What Is AI Decision-Making in Cybersecurity and Can We Trust It?

Can AI help us eliminate human error, or does it only adds to the threat?

Code on laptop screen 1
What Is DevSecOps and Why Is It Important?

Although we all agree that app security is serious stuff, it’s often overlooked in software development. DevSecOps aims to correct that.

Distorted image of planet Earth 1
Are the Climate Change Crisis and Rise of Cyberattacks Intertwined?

Extreme weather events, rising seas, and the loss of the Arctic are giving rise to cyberattacks worldwide. Here's how and why.

The Lego man is sitting in front of the computer and trying to remember his password 1
5 Secure Password Alternatives You Should Consider

If a hacker founds out your login credentials, they could access all your data. So if passwords are the problem, how can we go passwordless?

People silhouettes divided into groups 1
Centralized vs. Decentralized Identity Management Models: Which Is Better for Security?

Identity management models determine where data is stored and shared, so which is better: a centralized or decentralized model type?

A person using a laptop with special effects in the foreground 1
6 Reasons Why Supply Chain Attacks Are on the Rise

Such attacks are becoming a major headache for cybersecurity teams, and countering them is a massive challenge.

security sign on mobile 1
Zero Trust vs. Zero-Knowledge: What’s the Difference?

These two security concepts may sound similar but they’re completely different.

A black and white optical illusion that looks like the Sun. 1
What Are Adversarial Attacks in Machine Learning and How Can We Fight Them?

You might've heard of adversarial attacks in relation to artificial intelligence and machine learning, but what are they? What are their aims?

black phone on top of book secured 1
What Is Zero-Knowledge Security and Why Is It Critical Today?

End-to-end encryption has paved the way for zero-knowledge security, but there’s more to it.

Abstract image of a hooded hacker 1
How Hackers Use Generative AI in Their Attacks and What We Can Do About It

Generative AI is a double-edged sword used for offense and defense against cybercrime.

Contemporary cityscape with a motherboard in the background 1
Is the Use of AI in Cybersecurity Making the World More Secure?

While the pros of utilizing AI in cybersecurity may outweigh the cons, AI is still adding to cyber threats.

The cloud is sitting on a blue motherboard 1
Is Data Stored in the Cloud Secure?

While no security system is fool-proof, thanks to encryption, redundancy, and 24/7 monitoring, your data should stay on the safe side of the cloud.

Black and Green Vertigo of Binary Numbers 1
256-Bit AES vs. XChaCha20: Which Is More Secure?

The good old AES is still considered a golden standard for online security while XChaCha20 is simpler, faster, and future-proof.

1 2
Page 1 / 2