Search Results for: Information Communication Technology Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have... Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or... Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The... Blog Post Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the... Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Blog Post The Underlying Basis for Responsible Disclosure of Vulnerability March 11, 2021 Reporting by security researchers to an organization of the found security vulnerabilities in its hardware or software refers to responsible... Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post EU Commission Recommends Using Encrypted Messaging App, Signal March 2, 2020 In consideration of stronger cybersecurity, the European Commission has announced early this month that it is instituting an encrypted messaging... Blog Post OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data...
Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post Swiss Army Bans WhatsApp Amid Security Concerns February 3, 2022 The Swiss army has banned its personnel from using WhatsApp, Telegram, and Signal. The ban also extended to other foreign...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post Vulnerability Threatens Intel That Leads To Affect Its Users January 13, 2022 A recent Intel security vulnerability allows unauthorized individuals with physical access to exploit and install malware on the chip. The...
Blog Post Risk Assessment: NIST 800-30 vs ISO/IEC 27005 March 19, 2021 Security risk assessment is one of the key phases of the risk management process. Above all, it refers to the...
Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Blog Post The Underlying Basis for Responsible Disclosure of Vulnerability March 11, 2021 Reporting by security researchers to an organization of the found security vulnerabilities in its hardware or software refers to responsible...
Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post EU Commission Recommends Using Encrypted Messaging App, Signal March 2, 2020 In consideration of stronger cybersecurity, the European Commission has announced early this month that it is instituting an encrypted messaging...
Blog Post OVH Fire and Disaster Recovery – Lessons Learnt and What You Can Do to Avoid Data Loss April 23, 2021 The hosting community was recently rocked due to a major fire incident at one of hosting provider OVH’s Strasbourg-based data...