Blog

Critical Infrastructures and Industry 4.0: The View Is Missing for the Whole

By Ibrahim Koese, Head of Technology & Consulting, CSPi Germany Recent cybersecurity events show that the readiness for large-scale attacks on critical infrastructures have grown dramatically. It can’t be ruled out that this is only a harbinger, or a “proof of concept” for larger attacks. A few years ago, only a few isolated attacks on…

Read More

Let’s Face It: You’re a Hack Just Waiting to Happen

The latest mid-year report on data breaches issued by the ITRC reaffirms everyone’s suspicions that 2017 is going to be a banner year for the number of successful cyber breaches against US organizations. One notable takeaway: “If the number of breaches stays on pace with those reported in the first half of 2017, we’ll achieve…

Read More

Faster Data Breach Investigation Equals Faster Incident Response

Here we go, again.  The recent Petya ransomware attack caught the EU off-guard and created chaos that rippled through organizations wide and far.  Luckily, it was not as severe as Wannacry, but it reinforces that companies are still not prepared to quickly identify and take the necessary response to get a suspected cyber-attack under control….

Read More

A New Twist on Data Privacy Regulations – Employee Data Rights

Where data privacy is concerned the main thrust of the discussion has been around the protection and consequence deriving from a breach of customer data. This is the topic that receives the most attention from the media, government and has the largest impact on a company’s bottom line.  However, there is another side of data…

Read More

The Role of a Channel Partner in Data Privacy Regulation Readiness

Channel partners fulfill a critical role for their customers by guiding them toward the best technology investment given their unique business needs.  Until now, the notion of data security was highly important but not viewed through the lens of meeting PII data privacy compliance requirements.  However, with the rise of conflicting US regulations between states…

Read More

Malware detection is simple, right?

  Wrong.  Day after day millions of computers are attacked by malware. As the number of malicious software attacks has been growing over years, the types of malware detection and antivirus solutions also grow. Yet, the attackers have the upperhand as there is no protection against zero-day attacks, or something which has just been invented….

Read More

Reap the benefits of IoT without Compromising SCADA security

Industry 4.0 is the term used to describe the fourth industrial revolution, which is the future of industrial production based on the “Internet of Things” (IoT).  As with all major transitions this leads to exciting opportunities, but also great challenges. The good news is that IoT is expected to offer advanced connectivity of devices, systems,…

Read More

A New Approach to Incident Response

Cyber threat forensic analysis isn’t complicated. Assuming you have the right solution in place.   Organizations are under intense pressure to do all they can to secure their organizations. Yet, until now, their approach to cyber security has been faulty. This is not necessarily their fault – the industry has been lacking proper solutions, which…

Read More

The Implications of WannaCry on Your Critical Data

WannaCry? Only if you lose your most critical data. Last week’s attack has many people wondering: DzI wanna know if my critical assets were exposed to threats.dz Ransomware is bad, but losing data can be far more costly. Unfortunately, WannaCry’s apparent success will only further embolden more cyber criminals. What’s interesting is that a decent…

Read More