Editorial

Cyber Defence 2017 – what to expect?
Editorial Cyber Defence 2017 – what to expect?

The next year is not so far now. Cyber Defence 2017 is shaping up. By this we mean all cyber-security lines of defence, research-level and company-level. What will the trends be and how will they unfold? Although surprises are not excluded (see the recent Dyn attack), some have started to release

Dyn DDoS attack – why we are not tired of finding out more
Editorial Dyn DDoS attack – why we are not tired of finding out more

Playing out the fears everybody has on IoT security, on Friday the 21st October 2016 the Dyn company received a wave of DDoS attacks. Dyn handles “ visibility and control into cloud and public Internet resources ”. Due to its internet infrastructure role and the importance of its active operations,

Next Generation Firewalls – a mandatory technology?
Editorial Next Generation Firewalls – a mandatory technology?

Next Generation Firewalls, abbreviated NGFW, enforce network cyber security by bringing a modern solution to current threats. The upgraded hardware/software based protection system acts in detecting and/or blocking sophisticated attacks by reuniting more types of key assets . In fact, this type of

What do you know on fuzz testing?
Editorial What do you know on fuzz testing?

Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and that is just one of the effects. Damaged reputation also

Is IT alert fatigue one of your concerns?
Editorial Is IT alert fatigue one of your concerns?

Alarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose main activity resides in

Once breached, repeatedly breached – how to stop data loss
Editorial Once breached, repeatedly breached – how to stop data loss

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ specialized services for cyber-security system setting u

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later