Articles

European Security Directive – NIS2

Security Regulation in the European Union

In response to the increased threat of cyberattacks and the associated need to increase defenses (including technical defenses) against such incidents, the Council of the European Union and the European Parliament adopted the “NIS 2 Directive”) in December 2022. NIS2 stands for “Network and Information Security Directive” and is a[…]

Read More »

Backup or not Backup – Here is the Question

Backup or not Backup

I got greatly tempted to paraphrase this most well known phrase of William Shakespeare in order to draw your attention to the extremely crucial and always front-page issue of safeguarding data! As an afterthought, the existential connotations of the original, draw an almost equal parallelism to the life (and death)[…]

Read More »

Malware Campaigns use Public Cloud Infrastructures

Cloud Infrastructures have been gaining considerable momentum in attracting and hosting applications and services. They are especially suited for startups and sizing. Applications can be rolled-out faster than setting-up a native infrastructure. Nevertheless, the ease by which one can setup a legitimate operation can be used for illicit purposes as[…]

Read More »

Remote Business Operations in difficult Times

In a series of previous Conference Presentations we have discussed the modern tools that are available for interconnecting two or more remote locations. The acute circumstances caused by the recent Corona Virus Pandemia has led many Corporations to utilize a Telecommuting / Remote Office mode of operation. Offices remain operational[…]

Read More »
1 2 3 4