Our latest article is part of a series of three looking at DDoS protection technologies; what DDoS is, the types of protection, and how you can set up a robust defence.
This first article outlines exactly what DDoS is and why is should be incorporated at design stage.
“2020 Best Paper Award” for the Journal of Cyber Security and Mobility: A Realistic Deployment of Named Data Networking in The Internet Of Things.
The breach hidden within software updates for SolarWinds customers was introduced through a third-part vendor. NIST’s most recent guidance on identifying cyber risk explains why real-time monitoring is essential and acknowledges the threat posed by third-party vendors. Some of the key questions emerging from the SolarWinds surround the prospect of real-time vendor scanning.
In this article Mike Kelly and Dan Gardener discuss the possibilities and improvements needed in real-time vendor scanning.
You’re either secure or you’re vulnerable, either under attack or safe. But is it really that simple? With the recent SocialArk breach, it quickly became clear it wasn’t. Read our latest article on the security implications when using open source software.
Data Protection Day is a time to remind organizations across all industries and sizes about the important of data protection. Lately we’ve seen a lot of regulations like the GDPR or Schrems II, all small steps towards a proper data protection to secure personal data and give the topic the deserved recognition.
With the ruling of the European Court of Justice in the Schrems II case, pressure is growing on small and medium-sized companies to re-evaluate their processes and procedures and adapt them to the regulations of the EU GDPR. Mareike Vogt, data protection expert at TÜV SÜD, takes a closer look at this current topic.