Data-breaches

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing when it comes to using authentication methods…

11 years ago

From CISPA to Obama’s executive order on national cybersecurity

During the last days worldwide internet community expressed great concern on the possibility of a reintroduction of The Cyber Intelligence…

11 years ago

My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European…

11 years ago

Have you been hacked? … you must disclose it!

During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of…

11 years ago

Joining hands against cybercrime in Africa

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security…

12 years ago

Is it really so simple crack your password?

The numerous attacks and data breaches occurred during the last 12 months demonstrated that despite high attentions in security the…

12 years ago

Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government…

12 years ago

Part 1: Authentication Series – A world of passwords

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we…

12 years ago

Insider perspectives on global cyber safety and security status (Part 3 of 4)

Article published on The Malta Indipendent Data-breaches, intellectual property loss and your money... We have all heard the headlines about the…

12 years ago

This website uses cookies.