Marika Samarati Archive
With the elections in many European countries this year, European businesses are increasingly afraid that cyber espionage will rise. Dread of criminal intrusion and malicious interference has become a popular source of angst in the wake of last year’s US …
Phishing attacks are increasing in number and evolving in variety (newer methods include spear phishing and CEO fraud), putting at risk millions of users worldwide – actually, everyone with an email account. Why are they so popular among fraudsters and …
Technology, processes and people are the three building blocks of a sound cyber security strategy. The third building block – people – often gets left out because people are unpredictable and difficult to manage.
There is a strong link between an ISMS implementation project and penetration testing, and the more you know about how penetration testing can benefit your ISMS implementation, the more successful your project can be.
The UK’s Information Commissioner’s Office (ICO) has published a 12-step guide to help organisations prepare for the General Data Protection Regulation (GDPR).
Taking effect across the EU on 25 May 2018, the EU General Data Protection Regulation (GDPR) will supersede the 28 current national data protection laws based on the 1995 Data Protection Directive (DPD), bringing a uniform approach to data protection …
Leoni AG, one of the world’s leading wire and cable manufacturers, fell victim to an email scam that cost the company 40 million euros. According to a press release, “Leoni AG realised on Friday 12 August 2016 that it had …