Some articles written by the members of our community: the topics could vary from regulations to new technologies, from some new threats to privacy.
How to participate?
You are welcome to participate to our blog, you can contribute at different levels: you could share the articles or make comments to our posts. In case that you are an expert in CyberSecurity you could write us to publish your article.
Data Transfers between EU and USA
The Court of Justice of the European Union issued on 16 July 2020 the Schrems II vs Facebook ruling which resulted in the invalidation of the Privacy Shield. As this decision had immediate effect...
Securing Encryption Keys in Cloud: P1
For security reasons or regulatory compliance, encryption is one of the core data security controls for handling sensitive information. Simply put, encryption scrambles data into unreadable content.
GDPR risk-based approach
The GDPR lays down the rules relating to the protection of natural persons with regard to the processing of personal data and the rules relating to the free movement of personal data.
Spear Ransomware: part 2
Part 2: One year after the article, our prediction was correct: IBM developed a ransomware prototype able to choose specific targets. Let's see together how this is working.
About ModSecurity WAF
Today, many web applications are depending on a web-application firewall as an important part of their cyber security strategy. Let's discover together more about with a practical example.
PCI DSS in a Nutshell
The PCI DSS is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.
Main ransomwares in 2017
The Ransomware one is a growing up trend and last year we saw the the raise of the ransomware worms with Wanacry, NotPetya and BadRabbit. Lets see what happened last year.
Bitcoin scam with love
More the things change, more they rest the same: 2017 presented us an old style scam attack, but this time target to your cryptocurrencies wallet. Let's discover together what could happen
Time to review your IAM strategy
Another data breach led by the lack of a proper IAM strategy. How many other breaches will happen before IAM will finally enter into the business and technical mind set of the companies?
Implement IAM for GDPR strategy
Working on the Swiss market in the IT security field, especially with Identity & Access Management technologies, I am receiving frequently this question: How IAM can bring you closer to the GDPR compliancy?
GDPR terminology in a nutshell
When a new regulation comes up, when a new directive has to be applied, when any kind of legal changes occur, everybody speaks about the consequences, procedures, but just a few of us takes really care about the content.
Nothing to hide
Still in these days I'm keeping listening people telling me that for them privacy is not important because they don't have anything to hide, but the discussion is much more complex than this..
Privacy and security by design
What does the GDPR say about the implementation of privacy and security by design? Embedded privacy and security by design is a new requirements under the new rules on privacy protection in the EU.
Spear Ransomware: part 1
Part 1: This is the first of three parts about the article. We will see together how target ransomware are developing on Internet, to understand how they are evolving and what we could expect next
Possible improvements in cybersecurity?
In this article, you will find an analysis, from a jurist point of view, on the possible resolution of cyber-security threat from the ever-expanding Internet of Things (IoT) or connected objects