Cyber for all - Page 6

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

CIS Controls Implementation Groups: How to protect enterprises
CIS Controls Implementation Groups: How to protect enterprises

Every day we are more and more exposed to cybercrime. Computers, smartphones and IoT devices are part of everyday life in every home and business. Added to this is the emergence of[...]

Read more
Supply chain attacks: When the bad guys attack from behind
Supply chain attacks: When the bad guys attack from behind

Software components make our lives easier. Thanks to them, companies and individuals can perform thousands of unimaginable actions in the analog world, from using a solution to mar[...]

Read more
18 CIS critical controls: Implementing a cybersecurity strategy
18 CIS critical controls: Implementing a cybersecurity strategy

CIS has designed 18 critical security controls to help companies analyze their security strategies and optimize them to repel attacks At the end of January, the U.S. subsidiary of [...]

Read more
Security Ratings: An initial view of companies’ security status
Security Ratings: An initial view of companies’ security status

Security ratings are used to conduct an external analysis of the security configuration of a company’s Internet-exposed infrastructure Although sometimes a score does not acc[...]

Read more
Mobile Apps Security Testing: Protecting companies and their customers
Mobile Apps Security Testing: Protecting companies and their customers

Do you know how many applications you have on your mobile? Probably many more than you think. Are they all secure? What security permissions have you granted to each one? Smartphon[...]

Read more
5 benefits of a security policy assessment
5 benefits of a security policy assessment

Security is one of the most important feelings for people. Since the dawn, humans have sought to feel safe from looming threats and unpredictable events. The search for security re[...]

Read more
Dear CEO: Ignoring cybersecurity will cost you dearly
Dear CEO: Ignoring cybersecurity will cost you dearly

The DORA regulation and the NIS2 directive approved by the EU raise cybersecurity requirements and increase the penalties for companies and management boards that fail to comply wi[...]

Read more
Network Security Assessment: Protecting assets, preparing for attacks
Network Security Assessment: Protecting assets, preparing for attacks

If there is anything more viral these days than ransomware, it is a TikTok challenge. In late November, the ‘Invisible Challenge’, in which people filmed themselves nak[...]

Read more
Simulation of cyber-attacks: Customize and automate your company’s security validation
Simulation of cyber-attacks: Customize and automate your company’s security validation

Cybersecurity is a strategic issue for companies and public administrations. In October, three public medical centers in Catalonia suffered a cyber-attack that paralyzed their acti[...]

Read more
Global security assessment: Knowing the weaknesses to address them
Global security assessment: Knowing the weaknesses to address them

On November 23, the European Parliament suffered a DDOS or Distributed Denial of Service attack, which caused its website to crash. A gang of Russian cybercriminals claimed respons[...]

Read more
1 3 4 5 6 7 8 9 11