Understand, Assess and Rate Your Cybersecurity Risk Level

April 28, 2019

The Cybersecurity Risk Assessment (CRA) is an online Risk Assessment and Management software tool (implemented and facilitated by training and online support) that allows enterprises to regularly check whether their cybersecurity profile is prepared for and resilient to cyber-attacks. It is a continuous improvement tool which gives enterprises the opportunity to improve their systems based on an informed analysis of their risk level allowing them to take action to mitigate those risks.

Spotlight

Booking.com

Since its foundation in 1996, Booking.com has been one of the travel sector’s best-kept secrets. Today we’ve got some serious numbers to our name: over a billion guest nights booked and counting, 950,000 room nights booked every 24 hours, 42 languages available and 21 million bookable rooms. We attribute our success to never losing sight of our customer’s needs and remaining true to our mission: to help leisure and business travellers, whatever their budgets, easily discover, book, and enjoy the world’s best places to stay.

OTHER WHITEPAPERS
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Ransomware Data Recovery Architectures

whitePaper | September 26, 2022

Ransomware attacks have been on the rise in recent years. They are extremely insidious in nature and have been foremost in many CEOs’ and CIOs’ minds lately. Ransomware is malware that prevents an enterprise from accessing and using its data, usually by encrypting the data in an inconspicuous manner so the victim does not know the attack is occurring.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More
news image

Acronis Cyber Protection Operation Centers Report: Ransomware dominates threat landscape

whitePaper | November 24, 2022

Acronis was the first company to implement complete integrated cyber protection to protect all data, applications and systems. Cyber protection requires the researching and monitoring of threats, as well as abiding by the five vectors of safety, accessibility, privacy, authenticity and security, or SAPAS. As part of the strategy, we’ve established four Cyber Protection Operation Centers (CPOCs) around the world to monitor and research cyberthreats 24/7.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More

Spotlight

Booking.com

Since its foundation in 1996, Booking.com has been one of the travel sector’s best-kept secrets. Today we’ve got some serious numbers to our name: over a billion guest nights booked and counting, 950,000 room nights booked every 24 hours, 42 languages available and 21 million bookable rooms. We attribute our success to never losing sight of our customer’s needs and remaining true to our mission: to help leisure and business travellers, whatever their budgets, easily discover, book, and enjoy the world’s best places to stay.

Events