Obituary : A last homage to Romulus Maier

Sadly on the 19th of July, Romulus Maier left us, after facing a long and painful illness with a courage which is difficult to describe. In the same way, it is extremely difficult to find the words to write a last homage to one of the founders of the IT media in Romania and the quarterly magazine CyberSecurity Trends.</p< It...

GDPR – a real opportunity for a new digital revolution

GDPR
A tsunami of reports, research & updates about the General Data Protection Regulation1 (GDPR) compliance before and post May deadline still seems insufficient to handle the compliance efforts with this regulation. One of the latest that hit my inbox just few weeks ago sounds like this: A new research report made by TrustArc, benchmarks the GDPR compliance status post May...

Cyber Security Awards

The 4th Annual Cyber Security Awards took place on a June evening, with a dazzling celebratory ceremony, held at the Park Plaza Hotel in Victoria, London. The awards founded in 2014 reward the best individuals, teams and companies within the cyber security industry. Excellence and innovation are core themes, throughout all categories. With independent, industry leading judges, companies are...

The Next Generation Cyber Operations Center: Cyber Multilayered Centers, a unique vision approach with multiple capabilitie

High-profile breaches across different sectors, in the last few years, have proven the need for a better incident response (IR) capability to detect, contain, and remediate threats. These breaches are evidence that prevention alone is no longer a sufficient approach. However, many organizations lack a mature IR capability and once the incident is remediated, organizations are still left wondering...

Innovative uses of blockchain in Cybersecurity

“Innovative uses for blockchain technology are already becoming a part of other fields beyond cryptocurrencies and can be especially useful to boost cybersecurity. In this article we will take a look at how these effects have impacted our industry and understand how we can ride the blockchain wave to harness this technology to our advantage within cybersecurity.” The future is...

How the human weakest link can still break quantum messaging

Seals often with unique emblems were used for hundreds of years to prove a document was both authentic and untampered. Before the advent of computing and telecommunications, if you wanted to send a secure message you would seal it with wax. When the recipient received it, if the seal was broken, they would know it had been intercepted. Whilst...

Why waste time hacking an enterprise for client’s personal data, when you can collect it directly from people’s smart home?

By chance, the enterprise world can count on a myriad of experts and consultants to help secure infrastructure and systems against a cyberattack that would for example collect client’s private data. But with this crazy wild and totally unsecured consumer run for a smart home, it might become easier to collect directly from the client itself! Billions of Dollars are...

Social Engineering: You’re Never Too Smart to Be Scammed

It’s no secret that system users within an organization pose a great threat to cybersecurity, even when an organization has invested in advanced technology to prevent security breaches. Whether they are naïve or merely distracted, these users can – and all too often do – compromise the security of the whole organization with a single click. Of course, the users...

Mobile Financial Malware 2017: international threat report

The international threat report is intended to describe the typical behaviour of Android malware, in particular within a financial context. To access the full document please scan the QRCode below. Developers of mobile banking/payments malware are the first to use new technologies and are always looking for ways to bypass security mechanisms implemented in mobile operating systems. The full report is...

ATM heist

Go to an ATM at the right place, at the right time, and you could be collecting a whole lot of free money. Over $1.25 billion has been spewed out by cash machines, in over 40 countries, since 2013. Some ordinary people will have been offered cash by these ATMs, for no apparent reason. But the majority was collected by...