Security Companies and Security Startups
Security Startups will be the most innovative and interesting companies in the next years. Although cybersecurity can only be optimized…
Security Startups will be the most innovative and interesting companies in the next years. Although cybersecurity can only be optimized…
An incident is security relevant if one or more questions are answered positively: Is personal data / employee data affected…
There are four key components of a computer security incident response plan: Preparation: Preparing stakeholders on the procedures for handling…
The requirements for a Password Manager are extremly important. You must always access the server to retrieve stored passwords at…
As soon as a CISO arrives in the company, carry out an assessment to understand which are the most relevant…
Risk management in information security is the concept where an organization introduces a formal process to manage the risks introduced…
To address the subject of information security appropriately, an organization must analyze the status of its own information security. In…
Three vulnerabilities plague Samba, including one critical and one high severity vulnerability. Specifically, remote attackers can exploit them to execute…
The intentions of the Biden Administration to strengthen the US cyber security, following the SolarWinds, Microsoft and Colonial Pipeline cases,…
A new variant of the banking trojan BRATA has been identified and, thanks to increasingly advanced features, it is able…