Facebook iconTwitter icon
B2B-Network:
Analysis
The Key to Organizational IT Security and Compliance
Thumb compliance itsicherheit

IT security and compliance are critical to the success of an organization. Without a proper IT security and compliance set up, an organization can't effectively protect its assets, which puts is entire existence at risk. Both IT security and compliance help the organization to strengthen security, improve processes, meet regulatory requirements, and achieve other important business objectives. IT security and compliance are the frameworks that provide a common language that can be used from server rooms to boardrooms.

For many IT professionals, IT security and compliance are more or...

» Read more
Analysis
The Benefits of Implementing Information Security Management Systems (ISMS) 
Thumb informationsecuritymanagementsystem

Information Security Management Systems (ISMS) is a term from the business continuity industry, and it relates to the policies and procedures you put in place to manage your IT security. Specifically, it relates to the protection of your IT data, and it is a popular topic at the moment thanks to the data protection rule changes that have occurred in the EU (GDPR), and it is popular worldwide because of the increasing success of data hijackers who insert ransomware into a company's systems, lock down some data, and then charge the company to unlock the data. It seems that companies have...

» Read more
News
VPN Filter More Dangerous Than Assumed
Thumb vpnfiltermalware

The malware "VPNFilter" was discovered in May, and it quickly became evident that the malware was wide reaching, and dangerous. Now that the infection has had time to spread, however, we are starting to appreciate exactly how dangerous. 

 

A Huge Number of Vendors Affected 

The list of affected devices is, essentially, a who’s who of router makers. Asus, D-Link, ZTE, Huawei, UPVEL and Ubiquiti are all on the list, as well as TP-Link, Linksys, Netgear, and numerous other manufacturers. The only piece of good news, so far, is that the vulnerable pieces of...

» Read more
Analysis
The value of Intrusion Detection Systems
Thumb intrusiondetectionsystems

Intrusion Detection is a system designed to monitor network traffic for any suspicious activities or known threats. If such anomalies are found, the system will provide information such as the type of suspected attack, the targeted address and where it came from. Intrusion detection systems can be categorized as host-based, if the sensors that detect the threat are placed on a host, or network-based, if the sensors are placed on a network.

 

How an IDS works

The main purpose of an IDS is to detect and report an anomaly, but not to block or stop it. This is in contrast to a firewall or...

» Read more
Practical Advice
The Importance of Physical IT Security
Thumb physische itsicherheit

Physical IT security can be defined as means of protecting components that are related to the system that include data, hardware, software, and networks. These devices are protected from events and actions that may occur physically – e.g. a robbery – which poses danger to the owner and the apparatuses. 

This type of security is mostly ignored and instead, technical and software threats are taken seriously. Therefore, placing enforced measures to protect the components against them is advisable. Basically, there are various ways that the components can be protected...

» Read more
Study
Is GDPR an inhibition?
Thumb dsgvo hindernis

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. These are a set of regulations governing how companies in Europe collect and use data they receive from their consumers. It aims at giving consumers more control over how their data is being collected and used. While these regulations aim at making companies more responsible, there are fears that it may hinder innovation.

 

Why GDPR may be a hindrance

GDPR has been on the works for a while. It aimed at updating the Data Protection Directive that came into place in 1995. This means that some of the decisions...

» Read more
Study
How Hackers are Using Modified Malware for Cryptomining
Thumb malware bedrohung

Over the years, hackers have used Ransomware to blackmail computer users. Ransomware is a malicious malware that encrypts computer files. They then ask for ransom from the PC owners to remove the malware. However, these hackers have turned to a new tactic of infecting computers with a malware that enables them to mine cryptocurrencies with your computer, without your knowledge of course.

 

How hackers are using coinhive to mine cryptocurrencies on your computer 

Coinhive is a JavaScript code that is attached to certain web pages and is used to mine cryptocurrencies each time you...

» Read more
Analysis
The Use of AI in IT Security
Thumb ki itsicherheit

Advancements in computing power have seen the rise in the use of AI technologies by organizations as they aim to bolster cybersecurity. AI works by automating complex processes to help detect, analyse and react to security breaches. While the use of AI is increasing, it does not necessary mean that security personnel are no longer needed. Its main aim is to compliment conventional protocols to help organisations better deal with cybersecurity issues.

 

Advantages provided by AI in cybersecurity

Since AI uses Machine Learning, it adapts over time, which makes it easy to deal with the...

» Read more
Analysis
Do You Need SIEM Systems?
Thumb siem

Security information and event management (SIEM) software is meant to collect data from multiple networks and check for any unusual activities. In this way, the systems maintain cybersecurity at an advanced level. They can detect any intrusions into your system in real time, meaning your IT team will be able to stop such threats before any damage is done.

 

Risk Assessment

All companies need a risk assessment tool so that they can determine how secure their networks are. You need to identify and mitigate any attacks quickly or else you will experience massive data breaches. Businesses...

» Read more
News
Intel Lines up Patches for New Spectre Versions
Thumb intel next generation spectre

Intel works to understand and provide solutions to any issues reported to them. This is is done to achieve their goals of keeping their products safe while protecting their client's data. 

Just like in the past, bugs have been found to breach the security of their well developed system. Meltdown and Spectre are some the common security flaws that have been identified before. Both of them were attributed to the design of their microprocessor chips. The kernel memory found on the x86 processor chips were affected in the previous bug discoveries.

 

Spectre Next Generation

This is...

» Read more
Loader