Cybersecurity isn’t a destination

February 27, 2019

There is no single, straight path that will get you to the point where you can say, “We did it! We’re 100% cyber-secure.” A more realistic destination is cyber resiliency — the ability to prepare for and adapt to changing conditions, so you can withstand and recover rapidly from disruptions. Achieving cyber resilience depends on what we like to call the cybersecurity lifecycle — an ongoing cycle of interconnected elements that compliment and reinforce one another.

Spotlight

IntaForensics

We offer the highest quality independent digital forensic services to Law Enforcement and Commercial Organizations. We aim to: Maintain professional practices to ensure forensic services are applied effectively and ethically whilst maximizing technological applications and opportunities for innovation. Proactively direct forensic services to ensure customer needs and expectations are fulfilled. Continually improve the management system and enhance customer satisfaction.

OTHER WHITEPAPERS
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More

Spotlight

IntaForensics

We offer the highest quality independent digital forensic services to Law Enforcement and Commercial Organizations. We aim to: Maintain professional practices to ensure forensic services are applied effectively and ethically whilst maximizing technological applications and opportunities for innovation. Proactively direct forensic services to ensure customer needs and expectations are fulfilled. Continually improve the management system and enhance customer satisfaction.

Events