MakeUseOf

Sead Fadilpašić-Contributing Writer for Security

Sead Fadilpašić

Contributing Writer for Security

About Sead Fadilpašić

Sead is a seasoned journalist with more than 15 years of experience. He loves writing about cybersecurity and the blockchain, which he's been following closely since 2017. He spends his free time with his two daughters.

Sead has a university degree in Journalism and Public Relations, and has passed HubSpot's course on Inbound Marketing, as well as Udemy's course on SEO.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Person wearing hoodie and a neon mask 1
Cyberattacks on Gaming: Why the Risks Are Increasing for Gamers

Gamers, it’s high time to level up your security! Here's why cyberattacks on the games industry have increased.

hot news 1
The Ultimate Guide to Cybersecurity Trends and Threat Awareness

Here are six strategies for keeping pace with ever-evolving cyber threats and upgrading your security game.

many folk strolling across a zebra crossing 1
What Is Privileged Identity Management? How Can It Strengthen Your Cybersecurity?

Mastering privileged identity management is a must for robust cybersecurity. Here's what it means and how it works.

Man walking along a sidewalk during nighttime 1
How Do Hackers Sell and Trade Your Data in the Metaverse?

Inside the metaverse data marketplace... Let's explore the dark side of the metaverse, where personal data is a precious commodity.

kneeling down in a futuristic environment 1
The 9 Top Technology Trends That Are Shaping the Future of Cybersecurity

The latest tech trends can help you future-proof your cyber defenses. Here are the technologies you need to keep an eye on.

A padlock with keyboard keys scattered around 1
Why Having a Bigger Security Stack Is Not Always Better for Cybersecurity

Having strong cybersecurity is a balancing act where quality comes before quantity.

Faceless anonymous hacker with a laptop 1
Meet the Most (In)Famous Hacking Groups Active Today

Get a sneak peek into the world of modern hacktivists and cybercriminals.

Man following train track into virtual world  1
Cybersecurity in the Metaverse: Is the Metaverse Secure and What Threatens It?

The metaverse comes with various cybersecurity problems, so how can they be fixed?

sharks in inky black sea 1
Why Sharks Are Serious Cybersecurity Risks (Yes, Sharks)

Let’s dive into the depths of cybersecurity's most unusual threat: sharks. Yes, you read that right.

A man reading a book 1
How to Create a Successful Cybersecurity Risk Awareness Campaign

Creating a resilient cybersecurity culture starts with raising awareness.

Handshaking between a person from a laptop and in the office 1
Why Your Customers Trust You More When You Prioritize Cybersecurity

We all prefer to do business with companies we believe will keep our data safe.

Word security on a computer screen 1
How to Make Sure Your WordPress Website Is Secure

Don't leave your WordPress site vulnerable in the world of ever-evolving cyber threats. Here's how to check your blog and keep it secure.

Woman biting a pen in front of a laptop 1
In-Office vs. Remote vs. Hybrid Work: Which is Best for Cybersecurity?

Is one approach to work safer than all the others?

Man with hands behind head looking at laptop 1
How to Ensure You’re Not Being Scammed When Buying a Domain Name

Keep your investments secure with a simple guide to scam-free domain purchases.

Ecommerce street sign with green traffic lights at each side 1
How to Protect Your Online Store from Cyberattacks?

Bulletproof your e-commerce store and make sure you're a step ahead of cybercriminals.

Artificial intelligence presented in an abstract manner 1
What Is AI Decision-Making in Cybersecurity and Can We Trust It?

Can AI help us eliminate human error, or does it only adds to the threat?

Code on laptop screen 1
What Is DevSecOps and Why Is It Important?

Although we all agree that app security is serious stuff, it’s often overlooked in software development. DevSecOps aims to correct that.

Distorted image of planet Earth 1
Are the Climate Change Crisis and Rise of Cyberattacks Intertwined?

Extreme weather events, rising seas, and the loss of the Arctic are giving rise to cyberattacks worldwide. Here's how and why.

The Lego man is sitting in front of the computer and trying to remember his password 1
5 Secure Password Alternatives You Should Consider

If a hacker founds out your login credentials, they could access all your data. So if passwords are the problem, how can we go passwordless?

People silhouettes divided into groups 1
Centralized vs. Decentralized Identity Management Models: Which Is Better for Security?

Identity management models determine where data is stored and shared, so which is better: a centralized or decentralized model type?

1 2
Page 1 / 2