en flag +1 214 306 68 37

Our Publications in Media

ScienceSoft's experts are regularly featured in tech media, where they share hands-on guidance on IT best practices and emerging technologies. If you’d like to invite a ScienceSoft expert to contribute to your publication, we’ll be happy to connect you with the right specialist. In the meantime, explore selected publications below.

10 Approaches You Can Take To Shield Yourself Against Ransomware Attacks

with contributions from Boris Shiklo, Chief Technology Officer at ScienceSoft

Read on Forbes

5 Biggest IT Compliance Headaches and How to Address Them

with contributions from Boris Shiklo, Chief Technology Officer at ScienceSoft

Read on CIO.com

Penetration Testing by Letter of the Law

by Ulad Murashka, Cybersecurity Expert, CEH

Read on Security Magazine

A Cybersecurity Primer for Mid Sized Businesses

by Ulad Murashka, Cybersecurity Expert, CEH

Read on Packt

Network Vulnerability Assessment for Ecommerce Solutions

by Ulad Murashka, Cybersecurity Expert, CEH

Read on Cyber Defense Magazine

3 Cybersecurity Lessons for E-Commerce Website Administrators

by Tanya Yablonskaya, Ecommerce Industry Analyst at ScienceSoft

Read on Packt

Secure Payment Forms: 6 Ways to Secure Customer Information During Checkout

with contributions from Vadim Belski, Head of AI, Principal Architect at ScienceSoft

Read on FastSpring blog

Cyber Security Job Description: What to Expect Working in the Field

with contributions from Dmitry Kurskov, Cybersecurity Director and Principal Architect at ScienceSoft

Read on Rasmussen University blog

What Are Social Engineering Attacks? (Types & Definition)

with contributions from Ulad Murashka, Cybersecurity Expert, CEH

Read on Fortra blog

Best Practices for Data Security in Hybrid Environments

with contributions from Ulad Murashka, Cybersecurity Expert, CEH

Read on Fortra blog

Internal Network Security Mistakes to Avoid

with contributions from Dmitry Kurskov, Cybersecurity Director and Principal Architect at ScienceSoft

Read on Network Computing