Joom!Fish config error: Default language is inactive!
 
Please check configuration, try to use first active language

News-events
Latest News

Understand the Cloud Threat Landscape
JANUARY 02,2017

Cyber attacks are on the rise. Companies both large and small are targeted daily by hackers seeking valuable data to monetize in the cyber underground. Recent reports show that 87% of organizations are making use of cloud infrastructure, while analysts predict spending will exceed $200 billion in 2016 (source: www.alertlogic.com).

More...

'Mobile Wallets 101': Your guide to the future of cardless transactions
DECEMBER 09,2016

Financial institutions understood early on the importance of being "top of wallet" when it came to winning the "plastic war." Make your ATM, debit or credit card the go-to item for transactions and you're solid with that customer or member (source: www.mobilepaymentstoday.com)

More...

Privacy Impact Assessments: the CNIL publishes its PIA manual
NOVEMBER 11,2016

Article 34 of the French Data Protection Act provides that data controllers shall “take all useful precautions, with regard to the nature of the data and the risks of the processing, to preserve the security of the data…” (source: http://www.cnil.fr/)

More...

Regin: Top-tier espionage tool enables stealthy surveillance
NOVEMBER 24,2014

Regin is a multi-staged, modular threat, meaning that it has a number of components, each depending on others, to perform attack operations. This modular approach gives flexibility to the threat operators as they can load custom features tailored to individual targets when required. This analysis illustrates Regin’s architecture and the many payloads at its disposal (source: www.symantec.com).

More...

Key Findings from The Global State of Information Security Survey 2015 by PWC
OCTOBER 15,2014

Given the nature and number of very prominent security breaches over the past year, it comes as no surprise that incidents reported by respondents to The Global State of Information Security® Survey 2015 continued a year-over-year rise (source: www.pwc.com).

More...

A Guide on How to Find Cardholder Data without Automated Tools for PCI Assessors
SEPTEMBER 17,2014

During the course of an assessment, PCI Assessors must validate that the perceived compliance scope isin!fact accurately defined and documented. Automated discovery tools, while effective to find cardholder data, sometimes are not an option due to the negative impact they may have in a production environment. In this paper, the author discusses audit techniques and tips!on how to find cardholder data without using automated tools (source: www.sans.org).

More...

NIST releases report on cryptography expertise
JULY 16,2014

This report from Visiting Committee on Advanced Technology (VCAT) of the National Institute of Standards and Technology (NIST) to the NIST Director contains the VCAT’s recommendations on how NIST can improve the cryptographic standards and guidelines development process, in response to community concerns that a cryptographic algorithm in a NIST standard had been deliberately weakened (source: www.nist.gov).

More...

Greater oversight, deeper insight: Boardroom strategies in an era of disruptive change
JUNE 16,2014

In this environment of ongoing, tumultuous change, organizations and their management and boards of directors must respond quickly and adeptly if they are to effectively address all the disruptive changes that surround and affect them. For boards of directors, this often requires greater oversight – expanding their scope to include activities and areas that were not traditionally part of their mandate. At the same time, boards must ensure that management provides them with deeper insights into the organization’s activities so directors can clearly understand all of potential opportunities and risks (source: www.deloitte.com).

More...

2014 Cost of Data Breach Study: Global Analysis
MAY 09,2014

IBM and Ponemon are pleased to release the ninth annual Cost of Data Breach Study: Global Study. According to the research, the average total cost of a data breach for the companies participating in this research increased 15 percent to $3.5 million. The average cost paid for each lost or stolen record containing sensitive and confidential informatio n increased more than 9 percent from $136 in 2013 to $145 in this year’s study (source: www.ibm.com).

More...

2014 Data Breach Investigations Report
APRIL 28,2014

More incidents, more sources, and more variation than ever before—and trying to approach tens of thousands of incidents using the same techniques simply won’t cut it. Not only would the dominant incident characteristics drown out the subtleties of the less frequent varieties. Identified nine patterns that together describe 92% of the confirmed data breaches collected in 2013. Find it simply astounding that nine out of ten of all breaches observed by 50 global organizations over a full year can be described by nine distinct patterns (source: www.verizonenterprise.com).

More...

Cyber security is crucial for protection against threats for smart grids claims EU cyber security Agency in new report
FEBRUARY 10,2014

The EU’s cyber security agency ENISA signals that assessing the threats for smart grids is crucial for their protection and is therefore a key element in ensuring energy availability. This report provides a threat landscape affecting smart grid components. It takes stock of available cyber security and protection approaches as well as good practices in the field. The study also lists internal threats affecting IT smart grid assets, including a variety of threats emanating from errors and insider attacks (source: www.enisa.europa.eu).

More...

Improving SCADA System Security
DECEMBER 09,2013

Several audits executed by governments on their critical infrastructures have illustrated a dangerous scenario. They demonstrate the lack of security mechanisms for the many systems located all over the world. But what is really concerning is the absence of a precise census of SCADA systems for many industrialized countries (source: www.infosecinstitute.com/).

More...

<< Prev 1 2 3 4 5 6 7 8 9 Next >>