ICS Components

| | ICS Components
Introduction All components that are discussed in this writing can be found in the two types of ICSes: Supervisory Control and Data Acquisition (SCADA) and Distributed Control System (DCS). An ICS... Go on to the site to read the full article ... Read More

Reverse Engineering and Malware Analysis Tools

Introduction Reverse-engineering and malware analysis tools have an important role to play in terms of cybersecurity. For example, app developers and security teams can implement these control... Go on to the site to read the full article ... Read More

Best Practices for the Protection of Information Assets, Part 3

| | Asset Security
Introduction In the previous two installments of this series, we examined information security management and the implementation and monitoring of security controls. Now, in this third and final part... Go on to the site to read the full article ... Read More

Best Practices for the Protection of Information Assets, Part 2

In Part 1 of this article series, we discussed Information Security Management, or ISM. This second installment will cover the implementation and monitoring of security controls, including logical... Go on to the site to read the full article ... Read More
Best Practices for the Protection of Information Assets, Part 1

Best Practices for the Protection of Information Assets, Part 1

Introduction This article series will discuss best practices for the protection of information assets, drawing from a wide array of sources. These articles are intended to be equally useful for a... Go on to the site to read the full article ... Read More
Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Introduction Both the terms ‘Internet of Things’ (IoT) and ‘Privacy by Design’ (PbD) were coined back in the 90s. The original idea behind PbD is to weave privacy into the... Go on to the site to read the full article ... Read More

Interview With an Expert: How Does a CISO Learn to Be a CISO?

| | Hacking
The role of the chief information security officer (CISO) is quickly becoming more important as cybersecurity in general becomes more intertwined with companies’ business activities. This fact... Go on to the site to read the full article ... Read More
A Brief Guide to GDPR Compliance

A Brief Guide to GDPR Compliance

Introduction: What do you know about the GDPR? The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth “the GDPR” or “the... Go on to the site to read the full article ... Read More
Layer Seven DDoS Attacks

Layer Seven DDoS Attacks

What is Layer 7? The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model... Go on to the site to read the full article ... Read More

How Criminals Can Exploit AI

Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is expected that AIs for attacking purposes may... Go on to the site to read the full article ... Read More

Secure Guardrails