“Application Whitelisting” – The most effective anti-malware strategy

Analyzing the data processed by CERT-RO over the past few years on various malware alternatives, as well as the information published by various cybersecurity...

Cybersecurity – The United Nations (and not only) Acting as One

The ITU, as requested by the international community through the UN World Summit on the Information Society, has taken as a core principle of...

The growing role and risk of connected everything

As I write the  editorial for   this  second  English language edition of CyberSecurity Trends, in the height of the European summer, it seems after...

A little cyber-culture in a world of cyber-intoxication

I would like to welcome everyone to this, the first English language edition of CyberSecurity Trends, which is a quarterly magazine already published in Europe in French, Italian and Romanian languages. The magazine is proud to have endorsement from the United Nations ITU cybersecurity team.

The O2 SS7 attack

The start - or the beginning of the end? In May, O2 Telefonica in Germany confirmed that it had been the victim of a mobile...

Cyber-attacks on fintech companies

What are the costs associated with a data breach or a cyber attack on a fintech company? Have these costs been increasing or decreasing....

Introduction to the EU General Regulation on Data Protection (GDPR)

Adopted on April 27, 2016, this ambitious and future oriented Regulation will be directly applicable in each of the European Union Member State as...

VIP Interview with Giancarlo Caselli : From the countryside directly to...

«The estimate regarding the “turnover” achieved by the agriculture mafia has reached nearly Euro 21.8 billion, from approximately Euro 16 billion, states official data...

VIP Interview with Mohit Davar: “Cyber security has to go through...

It’s been more than a year since the famous Bangladesh Bank cyber heist took place. In February 2016, instructions to transfer $951 million from...

7 reasons why organizations get hacked

As a security consultant and solutions architect helping clients in the European region design and implement security solutions to protect critical network infrastructures, I...