Cyber for all - Page 13
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
Ethical hacking: attacking to improve
To optimize the cyber defenses of any company, it's essential to use services that meet the ideals and objectives of ethical hacking[...]
Read moreRed Team, the soldiers of the TIBER-EU program
The TIBER-EU program requires Red Team services to simulate threats to financial institutions and discover their weaknesses and vulnerabilities.[...]
Read moreTIBER-EU calls on cyber intelligence to arm banks
The TIBER-EU community project will test the cybersecurity structures of stock exchanges, banks, and community institutions. Cyber intelligence services will design attack scenario[...]
Read moreTIBER-EU, time to close the cybersecurity overdraft
The ECB has decided to strengthen the cybersecurity of banks through the TIBER-EU project in view of the growing number of cyberattacks on financial institutions[...]
Read moreCIS controls: best practices in cyber security
CIS controls and benchmarks provide IT staff and security analysts around the world with a set of tips and methodologies to ensure good cybersecurity practices and reduce risks on [...]
Read moreSecurity audit: Knowing system vulnerabilities
Through a security audit, you can gather all the relevant information to know the vulnerabilities of the system and protect the business[...]
Read moreOWASP methodology, the beacon illuminating cyber risks
The OWASP methodology has become a standard in the cybersecurity world for detecting and correcting vulnerabilities[...]
Read moreHoneypot and other Deception techniques, when the good guys spy on the bad guys
Honeypots in particular, and Deception techniques in general, have become a useful tool for detecting intrusions into company systems and unravelling the modus operandi of hostile [...]
Read moreCyber-attacks on mobile phones, the bloodletting that never stops
The number of cyber-attacks on mobile phones is growing all over the world, as is the volume of threats. Malware, ransomware...[...]
Read more10 (essential) tips for building a wall of cyber defenses
Tarlogic's Cybersecurity team has drawn up a basic manual for creating a minimum cyber defenses structure: limiting the exposure of services to the Internet, double authentication,[...]
Read more