How can I help in securing your assets?

Cybersecurity
Reliable protection of your computers, personal gadgets, and networks on the every threat level – from technical to human. Providing your confidentiality on the Internet.

Verification of information
Checking your business partners and competitors with two-factor technique of information-psychological analysis. Assessment of information credibility.

Risk assessment and threat modeling
Acute and high-qualified assessment of your systems’ vulnerabilities on the technical and human level and elaborating strong methods of protection.

Reputation protection
Recovering reputation after information attacks and negative media campaigns. Preventive creation of bulletproof reputation to resist such attacks. Working with public opinion.
Who owns information, he owns the world (N.Rothschilds)
Testimonials
Sergii has a wonderful mix of talent — both on the tech side and in communications. I very much enjoyed working with Sergii at Comodo. Companies today need his blend of capabilities, although many of them still do not know it. Sergii acted as a mediator between narrow technical specialists and our technically non-educated audience, giving Comodo a great boost in visibility, in blogs, presentations, articles, and quarterly reports that covered a wide range of malware and cybersecurity issues.

Sergii is an excellent technical content writer and presenter. His training videos are clear and presented with patience and willingness to show and help beginners and professionals on their way through difficult Cybersecurity topics.

Sergii Nesterenko has a rare combination of deep knowledge and hands-on experience in various cybersecurity domains and strong influential writing. This special feature is high-demanded nowadays when educating cybersecurity topics and promoting cybersecurity products have become a priority task. His mastery in turning technical cybersecurity topics in engaging articles, blog entries and other kinds of influential writing have enabled effective informing wide audience about Comodo’s team achievements in its struggle against cybercrimes. Sergii’s ability to transform hard-to-understand cybersecurity topics into capturing stories for the wide audience is a wonderful way to deliver value information and win the hearts and minds of the customers.
Add here excellent communication skills to work effectively in the multinational command -- and you’ll understand why I’m sure that Sergii will add a great value to any company that invites him onboard.

It was quite a pleasure for me to work with Sergii A. Nesterenko. As I was responsible for development management of Anti-Spam Lab team, we were contributing to come up with blockbuster blogs and articles to help the world of IT fight against unwanted emails and similar cyber attacks. Sergii is quite professional in gathering requirements, clearing unnecessary artifacts to deliver cutting-edge technical content in the most elegant way in a timely manner. I am sure he will bring success to every bit of work he involves in.

It's been a pleasure working together with Sergii A. Nesterenko as an author for 2 courses on CyberSecurity. He has cutting edge knowledge on Cybersecurity. He is ready to deal with difficult situations and solve the problems on time and take care of the project. He was open to feedback and was capable of adapting to new working environments. Very Positive attitude towards work. Our collaboration on the course has been a real joy for me and Packt. Would love to work with him again in future and create stellar video courses on cybersecurity.

What is especially impressive when you cooperate with Sergii is his ability to deeply analyze and acutely detect the main risks and threats and quickly elaborate methods of their prevention. His huge knowledge of the most modern technologies let to solve quickly and effectively even the most complicated security tasks.

Meeting a person like Sergey who so deeply and masterly understand all aspects of information warfare and cybersecurity and able to explain the most sophisticated secrets of hidden technologies is really just a fantastic big wheel.

Security highlights
that definitely will assist you
How I Ran Into a Clandestine Propaganda Network and … Got a Top-notch Idea
This story happened to me a few years ago. I was really angry and indignant when discovered that one of my feature articles was stolen and published under a false name on a website. Fortunately, the website had very detailed […]
Visited An Adult Website? Then You Are In Danger Now!
If the headline above frightened or at least alarmed you, that means you really can fall prey of this cybercrime. Because it is a bit different from others. While the perpetrators usually aim at a vulnerability of your PC, this […]
Social Engineering Attacks: How to Defend Against Them and How to Fight Back
The best way to defend yourself against the criminal mind is to try and get inside it. This is not without hazards of course, because you don’t want to end up becoming a criminal yourself! Social engineering is a particularly […]
Ukraine Takes Steps to Strengthen Its Cybersecurity
In late June this year, a huge malware cyberattack paralyzed Ukrainian government and private computer networks, before spreading across the globe. Now, Ukrainian MPs have adopted an important law aimed at strengthening state policy on cybersecurity. Here to talk about […]
My video courses

Learn online
Grab at Packt Publishing
HOT NEWS
Threatpost
- 1.3M Clubhouse Users’ Data Dumped in Hacker Forum for FreeClubhouse denies it was ‘breached’ and says the data is out there for anyone to grab.Becky Bracken
- Man Arrested for AWS Bomb PlotA man caught in an FBI sting allegedly said he wanted to destroy "70 percent of the internet" by going after the tech giant's data centers.Tara Seals
- Zero Trust: The Mobile DimensionHank Schless, senior security solutions manager at Lookout, discusses how to secure remote working via mobile devices.Hank Schless
- IcedID Circulates Via Web Forms, Google URLsAttackers are filling out and submitting web-based "contact us" forms, thus evading email spam filters.Tara Seals
- DOJ: Creep Coach Finagles Nude Athlete PhotosAllegedly perv college coach charged with cyberstalking and extorting nudes from his female athletes.Becky Bracken
Naked Security
- Apple and Google block official UK COVID-19 app update 12.04.2021UK coronavirus app update apparently included "feature creep" that's explicitly prohibited by Apple's and Google's programming rules.Paul Ducklin
- Naked Security Live – How to spot “government” scammers 12.04.2021Latest episode - watch now, and please share with your friends and family!Paul Ducklin
- Pwn2Own 2021: Zoom, Teams, Exchange, Chrome and Edge “fully owned” 09.04.2021Two lucky winners scooped $200k for just 20 minutes' work - if you don't count the days, weeks and months of meticulous effort beforehandPaul Ducklin
- Italian charged with hiring “dark web hitman” to murder his ex-girlfriend 08.04.2021Fortunately, this suspect wasn't as anonymous as he thought...Paul Ducklin