An interesting study based on a survey administered at the Las Vegas DEFCON 2016 event and titled The Black Report targeted hackers in an attempt to identify their strategies. While many studies address the point of view of cyber security experts and corporate IT managers, the current stu ... Read more ->
A security vulnerability is a weakness of a computer system or program an adversary could take advantage of to compromise the confidentiality, availability, or integrity of a resource. Vulnerability management is the whole set of processes aimed at identifying, classifying, evaluating, and mitigatin ... Read more ->
The speed of technological innovation and market launch of new devices, software and digital services leads to the impossibility to detect and timely eliminate all vulnerabilities. As a result, the large number and complexity of cyber security threats and incidents [1] exploiting vulnerabilities in ... Read more ->
ENISA recently published a report meant to help Member States and DSPs in crafting a common approach on the security measures for DSPs. This document outlines the high-level security objectives by providing security measures and examples of implementation, concerning DSPs and in particular: Clou ... Read more ->
According to the annual report of the Romanian Center for Cyber Security Incident Response (CERT-RO), in 2016 a total of 110 194 980 cyber security alerts have been collected and processed (up by 61.55% compared to 2015), which affected a number of 2 920 407 unique IP addresses. The analysi ... Read more ->