Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Filter by:
Date
Category
TIBER-EU, time to close the cybersecurity overdraft

TIBER-EU, time to close the cybersecurity overdraft

The ECB has decided to strengthen the cybersecurity of banks through the TIBER-EU project in view of the growing number of cyberattacks on financial institutions[...]

Read more
CIS controls: best practices in cybersecurity

CIS controls: best practices in cybersecurity

CIS controls and benchmarks provide IT staff and security analysts around the world with a set of tips and methodologies to ensure good cybersecurity practices and reduce risks on [...]

Read more
Security audit: Knowing system vulnerabilities

Security audit: Knowing system vulnerabilities

Through a security audit, you can gather all the relevant information to know the vulnerabilities of the system and protect the business[...]

Read more
OWASP methodology, the beacon illuminating cyber risks

OWASP methodology, the beacon illuminating cyber risks

The OWASP methodology has become a standard in the cybersecurity world for detecting and correcting vulnerabilities[...]

Read more
Honeypot and other Deception techniques, when the good guys spy on the bad guys

Honeypot and other Deception techniques, when the good guys spy on the bad guys

Honeypots in particular, and Deception techniques in general, have become a useful tool for detecting intrusions into company systems and unravelling the modus operandi of hostile [...]

Read more
Cyber-attacks on mobile phones, the bloodletting that never stops

Cyber-attacks on mobile phones, the bloodletting that never stops

The number of cyber-attacks on mobile phones is growing all over the world, as is the volume of threats. Malware, ransomware...[...]

Read more
10 (essential) tips for building a wall of cyber defenses

10 (essential) tips for building a wall of cyber defenses

Tarlogic's Cybersecurity team has drawn up a basic manual for creating a minimum cyber defenses structure: limiting the exposure of services to the Internet, double authentication,[...]

Read more
Yes, hacking cars is going to be one of the problems of this era

Yes, hacking cars is going to be one of the problems of this era

Digitalization is ushering in a new era in the automotive industry, but it has also opened a door to hacking cars[...]

Read more
The stress as adversarial factor for cyber decision-making

The stress as adversarial factor for cyber decision-making

Cyber decision-making is often conditioned by very short response times. High-level research analyzes the impact of stress in these situations[...]

Read more
4 lessons learned from Babuk’s source code

4 lessons learned from Babuk’s source code

Black Arrow Tarlogic's threat hunting team analyzes Babuk's source code to unravel how one of the most active ransomware of 2021 operates[...]

Read more
1 2 3