![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 9
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![Cyber insurance: A complement to security audits](https://www.tarlogic.com/wp-content/uploads/2022/09/cyber-insurance-1.jpg)
Cyber insurance: A complement to security audits
The digitalization of companies has had countless consequences. One of the most obvious is the fact that a large part of their critical assets is no longer physical, but digital. F[...]
Read more![DORA Regulation: Can your bank withstand a cyber-attack?](https://www.tarlogic.com/wp-content/uploads/2022/09/DORA-regulation-1-1.jpg)
DORA Regulation: Can your bank withstand a cyber-attack?
EU-driven DORA regulation is to measure the digital operational resilience of Europe's financial sector. Complete TIBER-EU program[...]
Read more![Protecting apps, people, and businesses, the goal of Google MASA](https://www.tarlogic.com/wp-content/uploads/2022/08/MASA-3-1.jpg)
Protecting apps, people, and businesses, the goal of Google MASA
Does anyone remember what it was like to host a dinner party with friends before we had mobile apps? Multiple, crisscrossing calls. Had to ask strangers because we couldn’t f[...]
Read more![Google MASA: What are the security requirements for apps?](https://www.tarlogic.com/wp-content/uploads/2022/07/MASA-2-1-3.jpg)
Google MASA: What are the security requirements for apps?
Since the dawn of civilization, human beings have wanted to standardize the great technological advances they have generated. The Roman Empire extended its way of building roads, b[...]
Read more![Google MASA: Assessing the security of apps available in the Play Store](https://www.tarlogic.com/wp-content/uploads/2022/07/MASA-1-2.jpg)
Google MASA: Assessing the security of apps available in the Play Store
A song starts playing on the radio. You like it and think «who could it be from?» You open your phone and download an app to recognize it for you. Then you download another app t[...]
Read more![How to use the NIST Cybersecurity Framework to combat ransomware attacks](https://www.tarlogic.com/wp-content/uploads/2022/07/NIST-3-1.jpg)
How to use the NIST Cybersecurity Framework to combat ransomware attacks
Throughout its history, mankind has created tools and devices of great technical value, but which did not find favor with the people, largely due to their lack of usability and pra[...]
Read more![NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks](https://www.tarlogic.com/wp-content/uploads/2022/07/NIST-2-1-1.jpg)
NIST Cybersecurity Framework: A compass for navigating the ocean of cyber risks
Throughout our lives, we are fortunate to have different mentors, who guide us through the inscrutable paths of destiny. Parents, grandparents, teachers, bosses, friends… The[...]
Read more![Demystifying Zero Trust](https://www.tarlogic.com/wp-content/uploads/2022/06/Zero-Trust-1-1.jpg)
Demystifying Zero Trust
When we are little, our parents and grandparents remind us over and over again never to trust strangers. We should never talk to people we don’t know, and certainly, never ge[...]
Read more![NIST Guidelines: a methodological underpinning for cybersecurity analysts](https://www.tarlogic.com/wp-content/uploads/2022/06/NIST-1-EN.jpg)
NIST Guidelines: a methodological underpinning for cybersecurity analysts
The National Institute of Standards and Technology (NIST) is a U.S. public organization dedicated to generating knowledge, developing resources, and organizing training programs in[...]
Read more![CVSS: Scoring IT Vulnerabilities](https://www.tarlogic.com/wp-content/uploads/2022/06/CVSS1.jpg)
CVSS: Scoring IT Vulnerabilities
From the moment we enter the education system, we are used to being evaluated. But evaluation is not limited to the educational sphere; we are evaluated in almost all areas of our [...]
Read more