ICS Components
Introduction All components that are discussed in this writing can be found in the two types of ICSes: Supervisory Control and Data Acquisition (SCADA) and Distributed Control System (DCS). An ICS... Go on to the site to read the full article ... Read More
Reverse Engineering and Malware Analysis Tools
Introduction Reverse-engineering and malware analysis tools have an important role to play in terms of cybersecurity. For example, app developers and security teams can implement these control... Go on to the site to read the full article ... Read More
Best Practices for the Protection of Information Assets, Part 3
Introduction In the previous two installments of this series, we examined information security management and the implementation and monitoring of security controls. Now, in this third and final part... Go on to the site to read the full article ... Read More
Best Practices for the Protection of Information Assets, Part 2
In Part 1 of this article series, we discussed Information Security Management, or ISM. This second installment will cover the implementation and monitoring of security controls, including logical... Go on to the site to read the full article ... Read More
Best Practices for the Protection of Information Assets, Part 1
Introduction This article series will discuss best practices for the protection of information assets, drawing from a wide array of sources. These articles are intended to be equally useful for a... Go on to the site to read the full article ... Read More
Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices
Introduction Both the terms ‘Internet of Things’ (IoT) and ‘Privacy by Design’ (PbD) were coined back in the 90s. The original idea behind PbD is to weave privacy into the... Go on to the site to read the full article ... Read More
Interview With an Expert: How Does a CISO Learn to Be a CISO?
The role of the chief information security officer (CISO) is quickly becoming more important as cybersecurity in general becomes more intertwined with companies’ business activities. This fact... Go on to the site to read the full article ... Read More
A Brief Guide to GDPR Compliance
Introduction: What do you know about the GDPR? The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth “the GDPR” or “the... Go on to the site to read the full article ... Read More
Layer Seven DDoS Attacks
What is Layer 7? The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model... Go on to the site to read the full article ... Read More
How Criminals Can Exploit AI
Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is expected that AIs for attacking purposes may... Go on to the site to read the full article ... Read More