A security vulnerability is a weakness of a computer system or program an adversary could take advantage of to compromise the confidentiality, availability, or integrity of a resource. Vulnerability management is the whole set of processes aimed at identifying, classifying, evaluating, and mitigatin ... Read more ->
The speed of technological innovation and market launch of new devices, software and digital services leads to the impossibility to detect and timely eliminate all vulnerabilities. As a result, the large number and complexity of cyber security threats and incidents [1] exploiting vulnerabilities in ... Read more ->
ENISA recently published a report meant to help Member States and DSPs in crafting a common approach on the security measures for DSPs. This document outlines the high-level security objectives by providing security measures and examples of implementation, concerning DSPs and in particular: Clou ... Read more ->
According to the annual report of the Romanian Center for Cyber Security Incident Response (CERT-RO), in 2016 a total of 110 194 980 cyber security alerts have been collected and processed (up by 61.55% compared to 2015), which affected a number of 2 920 407 unique IP addresses. The analysi ... Read more ->