Uncategorized
Cybercrime – what’s at stake?
The Cybercriminal market gives many ways to earn money. With technology becoming widespread, traditional offline crimes tend to shift into online spaces. Cybercriminals include both buyers and sellers. They gather to perform transactions of data. Products divide into three broad categories:
The Cybercriminal market gives many ways to earn money. With technology becoming widespread, traditional offline crimes tend to shift into online spaces. Cybercriminals include both buyers and sellers. They gather to perform transactions of data. Products divide into three broad categories: Read More
Welcoming DORA… another star on the stage of compliance!
The Digital Operational Resilience Act (DORA) is a regulation that aims to strengthen the IT security of financial entities such as banks, insurance companies and investment firms in the European Union. The regulation introduces uniform and harmonized governing principles for the management of cyber risks, streamlines reporting on cyber incidents, and supervises third-party risk. Organizations that fail to comply with DORA may face a periodic penalty payment of 1% of the average daily global turnover in the preceding year for up to six months until compliance is achieved.
The Digital Operational Resilience Act (DORA) is a regulation that aims to strengthen the IT security of financial entities such as banks, insurance companies and investment firms in the European Union. The regulation introduces uniform and harmonized governing principles for the management of cyber risks, streamlines reporting on cyber incidents, and supervises third-party risk. Organizations that fail to comply with DORA may face a periodic penalty payment of 1% of the average daily global turnover in the preceding year for up to six months until compliance is achieved. Read More
Most commonly used in phishing attacks…
In this article, we'll explore trends in documents used in phishing attacks. The purpose of such an attack is to get your login credentials (login + password) to online services. To make it more credible, attackers use websites that imitate well-known services that require password authentication from a third-party service or service (such as Google, Apple, or Facebook).
In this article, we'll explore trends in documents used in phishing attacks. The purpose of such an attack is to get your login credentials (login + password) to online services. To make it more credible, attackers use websites that imitate well-known services that require password authentication from a third-party service or service (such as Google, Apple, or Facebook). Read More
NIS2 – in anticipation of October 2024…
The NIS Directive is a step in the right direction for cybersecurity – therefore for our data and the services we use. Because the most important is to start. And to improve, because the NIS directive left quite a few things to be still covered. That is why it was decided to introduce NIS2 – covering a wider range of entities and introducing more stringent security requirements.
The NIS Directive is a step in the right direction for cybersecurity – therefore for our data and the services we use. Because the most important is to start. And to improve, because the NIS directive left quite a few things to be still covered. That is why it was decided to introduce NIS2 – covering a wider range of entities and introducing more stringent security requirements. Read More
SIEM, SOAR, and XDR basics for Security Analysts
In the ever-evolving landscape of cybersecurity, security analysts face a myriad of challenges. With an increasing number of threats and an overwhelming volume of security data, organizations are turning to advanced technologies to enhance their security operations. This article aims to shed light on the differences between three prominent solutions: SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and XDR (Extended Detection and Response). By understanding these differences, security analysts can make informed decisions about which technology best suits their organization's needs.
In the ever-evolving landscape of cybersecurity, security analysts face a myriad of challenges. With an increasing number of threats and an overwhelming volume of security data, organizations are turning to advanced technologies to enhance their security operations. This article aims to shed light on the differences between three prominent solutions: SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and XDR (Extended Detection and Response). By understanding these differences, security analysts can make informed decisions about which technology best suits their organization's needs. Read More