ЧЕМ Я ПОЛЕЗЕН ДЛЯ ВАС?

КИБЕР БЕЗОПАСНОСТЬ
Надежная защита ваших компьютеров, персональных гаджетов и сетей на всех уровнях угроз – от технического до человеческого. Ваша конфиденциальность в Сети.

ВЕРИФИКАЦИЯ ИНФОРМАЦИИ
Проверка искренности ваших партнеров и конкурентов с помощью двухфакторной методики информационно-психологического анализа. Оценка достоверности информации.

ОЦЕНКА РИСКОВ И УГРОЗ
Точная и квалифицированная оценка уязвимых мест ваших информационных систем на техническом и человеческом уровне и разработка методик их защиты и укрепления.

ЗАЩИТА РЕПУТАЦИИ
Восстановление репутации после информационных атак и “черного PR”. Превентивное формирование репутации, устойчивой к таким атакам. Работа с общественным мнением.
Кто владеет информацией, тот владеет миром (Н.Ротшильд)
ОТЗЫВЫ ПАРТНЕРОВ
Sergii has a wonderful mix of talent — both on the tech side and in communications. I very much enjoyed working with Sergii at Comodo. Companies today need his blend of capabilities, although many of them still do not know it. Sergii acted as a mediator between narrow technical specialists and our technically non-educated audience, giving Comodo a great boost in visibility, in blogs, presentations, articles, and quarterly reports that covered a wide range of malware and cybersecurity issues.

Sergii is an excellent technical content writer and presenter. His training videos are clear and presented with patience and willingness to show and help beginners and professionals on their way through difficult Cybersecurity topics.

Sergii Nesterenko has a rare combination of deep knowledge and hands-on experience in various cybersecurity domains and strong influential writing. This special feature is high-demanded nowadays when educating cybersecurity topics and promoting cybersecurity products have become a priority task. His mastery in turning technical cybersecurity topics in engaging articles, blog entries and other kinds of influential writing have enabled effective informing wide audience about Comodo’s team achievements in its struggle against cybercrimes. Sergii’s ability to transform hard-to-understand cybersecurity topics into capturing stories for the wide audience is a wonderful way to deliver value information and win the hearts and minds of the customers.
Add here excellent communication skills to work effectively in the multinational command -- and you’ll understand why I’m sure that Sergii will add a great value to any company that invites him onboard.

It was quite a pleasure for me to work with Sergii A. Nesterenko. As I was responsible for development management of Anti-Spam Lab team, we were contributing to come up with blockbuster blogs and articles to help the world of IT fight against unwanted emails and similar cyber attacks. Sergii is quite professional in gathering requirements, clearing unnecessary artifacts to deliver cutting-edge technical content in the most elegant way in a timely manner. I am sure he will bring success to every bit of work he involves in.

It's been a pleasure working together with Sergii A. Nesterenko as an author for 2 courses on CyberSecurity. He has cutting edge knowledge on Cybersecurity. He is ready to deal with difficult situations and solve the problems on time and take care of the project. He was open to feedback and was capable of adapting to new working environments. Very Positive attitude towards work. Our collaboration on the course has been a real joy for me and Packt. Would love to work with him again in future and create stellar video courses on cybersecurity.

В работе с Сергеем особенно впечатляет его способность глубоко анализировать и точно определять главные риски и оперативно предлагать методики их предотвращения. Его обширные знания в сфере самых современных технологий позволяют быстро, эффективно и главное – без больших затрат – решать очень сложные, иногда поначалу кажущиеся неразрешимыми задачи.

Встретить человека, который так глубоко и виртуозно разбирается во всех аспектах информационных войн и способен просто и доступно объяснить сложнейшие секреты информационных технологий – не просто удача, а бесценный подарок!

СЕКРЕТЫ БЕЗОПАСНОСТИ,
которые вам обязательно помогут
Ukraine Takes Steps to Strengthen Its Cybersecurity
In late June this year, a huge malware cyberattack paralyzed Ukrainian government and private computer networks, before spreading across the globe. Now, Ukrainian MPs have adopted an important law aimed at strengthening state policy on cybersecurity. Here to talk about […]
Украина должна быть готова к кибервойне
Украине необходимо развивать кибервойска и строить мощную защиту электронных систем и информационного пространства. Первый шаг для этого — принятие Верховной Радой закона о кибербезопасности. Об этом рассказывает эксперт по кибербезопасности Сергей Нестеренко.
Онлайн-конференция: каковы последствия вируса Petya.A? Часть2
Все, что вы хотели узнать о вирусе Petya.A и даже больше. Для чего придумали этот вирус? Почему нельзя доверять антивирусу? Грядет ли новая кибератака на Украину? Чем угрожает нам наступающая эпоха интернета вещей (IoT)? Как выжить и победить в новом цифровом […]
Онлайн-конференция: каковы последствия вируса Petya.A? Часть1
Все, что вы хотели узнать о вирусе Petya.A и даже больше. Для чего придумали этот вирус? Почему нельзя доверять антивирусу? Грядет ли новая кибератака на Украину? Чем угрожает нам наступающая эпоха интернета вещей (IoT)? Как выжить и победить в новом цифровом […]
МОИ ВИДЕОКУРСЫ
ГОРЯЧИЕ НОВОСТИ
Threatpost
- DOJ Says Doctor is Malware Mastermind 18.05.2022The U.S. Department of Justice indites middle-aged doctor, accusing him of being a malware mastermind.Nate Nelson
- APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days 18.05.2022Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.Elizabeth Montalbano
- April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell 18.05.2022Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.Sagar Tiwari
- Sysrv-K Botnet Targets Windows, Linux 17.05.2022Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.Sagar Tiwari
- iPhones Vulnerable to Attack Even When Turned Off 17.05.2022Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.Elizabeth Montalbano
Naked Security
- Pwn2Own hacking schedule released – Windows and Linux are top targets 18.05.2022What's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?Paul Ducklin
- Apple patches zero-day kernel hole and much more – update now! 17.05.2022You'll find fixes for numerous kernel-level code execution holes, including an 0-day vulnerability in many (though not all) versions.Paul Ducklin
- Firefox out-of-band update to 100.0.1 – just in time for Pwn2Own? 15.05.2022A new point-release of Firefox. Not unusual, but the timing of this one is interesting, with Pwn2Own coming up in a few days.Paul Ducklin
- He sold cracked passwords for a living – now he’s serving 4 years in prison 13.05.2022Crooks don't need a password for every user on your network to break in and wreak havoc. One could be enough...Paul Ducklin