Cyber for all - Page 12
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
A practical guide to understanding social engineering attacks
There are movie tunes that have become so widespread in the collective imagination that one can recognize them even if one has not seen the movie to which they belong. That is the [...]
Read morePCI DSS security audit: don’t let your card be stolen
The PCI DSS security audit is used to verify that technical security controls protect credit and debit cardholder data[...]
Read moreEthical hacking: attacking to improve
To optimize the cyber defenses of any company, it's essential to use services that meet the ideals and objectives of ethical hacking[...]
Read moreRed Team, the soldiers of the TIBER-EU program
The TIBER-EU program requires Red Team services to simulate threats to financial institutions and discover their weaknesses and vulnerabilities.[...]
Read moreTIBER-EU calls on cyber intelligence to arm banks
The TIBER-EU community project will test the cybersecurity structures of stock exchanges, banks, and community institutions. Cyber intelligence services will design attack scenario[...]
Read moreTIBER-EU, time to close the cybersecurity overdraft
The ECB has decided to strengthen the cybersecurity of banks through the TIBER-EU project in view of the growing number of cyberattacks on financial institutions[...]
Read moreCIS controls: best practices in cyber security
CIS controls and benchmarks provide IT staff and security analysts around the world with a set of tips and methodologies to ensure good cybersecurity practices and reduce risks on [...]
Read moreSecurity audit: Knowing system vulnerabilities
Through a security audit, you can gather all the relevant information to know the vulnerabilities of the system and protect the business[...]
Read moreOWASP methodology, the beacon illuminating cyber risks
The OWASP methodology has become a standard in the cybersecurity world for detecting and correcting vulnerabilities[...]
Read moreHoneypot and other Deception techniques, when the good guys spy on the bad guys
Honeypots in particular, and Deception techniques in general, have become a useful tool for detecting intrusions into company systems and unravelling the modus operandi of hostile [...]
Read more