Cyber for all - Page 12

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

CVSS: Scoring IT Vulnerabilities
CVSS: Scoring IT Vulnerabilities

From the moment we enter the education system, we are used to being evaluated. But evaluation is not limited to the educational sphere; we are evaluated in almost all areas of our [...]

Read more
OWASP: Top 10 Web Application Vulnerabilities
OWASP: Top 10 Web Application Vulnerabilities

Web applications are part of our daily lives. We use and consult them at work and home, for information and entertainment. Their use has become so widespread that they have become [...]

Read more
Red Team: The power of offensive security
Red Team: The power of offensive security

Red Team uses offensive security to help organizations detect vulnerabilities and protect against malicious attacks[...]

Read more
How to get the most out of the Internet using WiFi Planning
How to get the most out of the Internet using WiFi Planning

Thanks to tools such as WiFi Planning, making the most of the network is within reach of any organization WiFi sustains the world. In just a few decades, this technology has comple[...]

Read more
A practical guide to understanding social engineering attacks
A practical guide to understanding social engineering attacks

There are movie tunes that have become so widespread in the collective imagination that one can recognize them even if one has not seen the movie to which they belong. That is the [...]

Read more
PCI DSS security audit: don’t let your card be stolen
PCI DSS security audit: don’t let your card be stolen

The PCI DSS security audit is used to verify that technical security controls protect credit and debit cardholder data[...]

Read more
Ethical hacking: attacking to improve
Ethical hacking: attacking to improve

To optimize the cyber defenses of any company, it's essential to use services that meet the ideals and objectives of ethical hacking[...]

Read more
Red Team, the soldiers of the TIBER-EU program
Red Team, the soldiers of the TIBER-EU program

The TIBER-EU program requires Red Team services to simulate threats to financial institutions and discover their weaknesses and vulnerabilities.[...]

Read more
TIBER-EU calls on cyber intelligence to arm banks
TIBER-EU calls on cyber intelligence to arm banks

The TIBER-EU community project will test the cybersecurity structures of stock exchanges, banks, and community institutions. Cyber intelligence services will design attack scenario[...]

Read more
TIBER-EU, time to close the cybersecurity overdraft
TIBER-EU, time to close the cybersecurity overdraft

The ECB has decided to strengthen the cybersecurity of banks through the TIBER-EU project in view of the growing number of cyberattacks on financial institutions[...]

Read more
1 9 10 11 12 13 14