Editorial

Dyn DDoS attack – why we are not tired of finding out more
Editorial Dyn DDoS attack – why we are not tired of finding out more

Playing out the fears everybody has on IoT security, on Friday the 21st October 2016 the Dyn company received a wave of DDoS attacks. Dyn handles “ visibility and control into cloud and public Internet resources ”. Due to its internet infrastructure role and the importance of its active operations,

Next Generation Firewalls – a mandatory technology?
Editorial Next Generation Firewalls – a mandatory technology?

Next Generation Firewalls, abbreviated NGFW, enforce network cyber security by bringing a modern solution to current threats. The upgraded hardware/software based protection system acts in detecting and/or blocking sophisticated attacks by reuniting more types of key assets . In fact, this type of

What do you know on fuzz testing?
Editorial What do you know on fuzz testing?

Cyber-security nowadays is getting more and more competitive, and it certainly is a battlefield where companies can suffer losses of huge proportions when hit. Even zero day exploits can cost vast amounts of money if not remedied in time, and that is just one of the effects. Damaged reputation also

Is IT alert fatigue one of your concerns?
Editorial Is IT alert fatigue one of your concerns?

Alarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose main activity resides in

Once breached, repeatedly breached – how to stop data loss
Editorial Once breached, repeatedly breached – how to stop data loss

Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ specialized services for cyber-security system setting

Beveiligingscontrole – trying to elucidate a word
Editorial Beveiligingscontrole – trying to elucidate a word

As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged out of my account: Beveiligingscontrole.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later