Akitra delivers AI-powered, cloud-based compliance automation and cybersecurity solutions to provide a more integrated and efficient approach to safeguarding your organization’s data and applications quickly, cost-effectively,...
Month: November 2023
DELVING INTO THE EMERGING INFOSTEALERS OF 2023
The risk of cyber attack by information stealers continually poses a threat on organizations in the last few years, and continues to be a significant concern...
Cyber Supply Chain Attacks Target the Charity Sector Again
Cyber attacks are becoming increasingly problematical for charities. According to a survey that was released in October of 2017, it was found that one in eight...
AI Security Concerns in a Nutshell
This guideline introduces developers to the most relevant attacks on machine learning systems and potential complementary defences. It does not claim to be comprehensive and can...
Cybersecurity Checklist
A Cybersecurity Checklist is a comprehensive guide that outlines essential measures and best practices to ensure the security of digital systems, networks, and data. The checklist...
Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions
With the increasing integration of wireless, Internet- and network-connected capabilities, portable media (e.g., USB or CD), and the frequent electronic exchange of medical device-related health information...
Data Governance Building a Roadmap for Trusted Data
In many companies today, data governance has become increasingly important but what exactly is it? What does data governance mean?There are several definitions of data governance...
Data Privacy Run Book For State Government Agencies
1.1 PurposeThe purpose of a data privacy run book for state government is to provide a comprehensive guide and framework for ensuring the protection and privacy...
Data Protection
Is your information security and data privacy policy in compliance with industry standards and regulations? Priority: 1620, select the best idea: Views: 0
Data Protection at Work
FOR WHOM IS THIS BROCHURE INTENDED?FOR EMPLOYEESEvery employee who actively works for the company, whether as a manager or as an intern, must be familiar with...
2023 State of Operational Technology and Cybersecurity Report
The Fortinet 2023 State of Operational Technology and Cybersecurity Report is our fifth annual study based on data from an in-depth worldwide survey of 570 OT...
NEW YORK STATE CYBERSECURITY STRATEGY AUGUST 2023
The safe and secure functioning of our economy, critical infrastructure, and government services depends on our ability to protect digital infrastructure and sensitive information. However, as...
Simulated PhishingEducationalCampaign Guide
Phishing is a term that may have it origins in the attempt to get passwords by sending emails to “fish for a bite” from a victim...
Decision Making in Cybersecurity
Data breaches have become a fact of life. However, a closer look at the most egregious breaches shows that better decision making could have prevented these...
DevSecOps Checklists
Apache Hardening for DevSecOps Disable directory listingOptions -Indexes Enable server signatureServerSignature On Disable server signatureServerSignature Off Change server headerServerTokens Prod Disable server headerServerTokens Prod Enable HTTPSInstall...
DIGITAL IDENTITY STANDARDS
Analysis of standardisation requirements in support of cybersecurity policy Digital services and electronic transactions are becoming more and more important. This trend has been accelerated by...
Data Leakage FOR DUMMIES
Data leaks are a serious problem for organizations everywhere and stealing very sensitive information is, all too often, as easy as copying data to a USB...
DNS Incident Response
Root Cause Analysis with Detection Ideas DNS is the main entry point for all possible internet based cyber threats. If the DNS is safe, almost all...
EMAIL, YOUR CYBER SECURITY FRONTLINE
As information flows freely and communication happens at the speed of light, email remains the cornerstone of our online presence. However, with convenience comes vulnerability, and...
Industrial Control Systems: Engineering Foundations and Cyber-Physical Attack Lifecycle
Industrial control system (ICS) is a collective term used to describe different types of control systems and associated instrumentation, which include end-point devices, systems, networks, applications...
ESTABLISHING CYBER THREAT INTELLIGENCE
Humans have historically relied on Intelligence to make assessments, understand its implications and plan accordingly. Nations have relied extensively on Threat Intelligence in the military realm...
ESTRATEGIA NACIONAL DE CIBERSEGURIDAD DE LA REPÚBLICA ARGENTINA
La Estrategia Nacional de Ciberseguridad, establecida por el Poder Ejecutivo Nacional, sienta los principios rectores y desarrolla los objetivos centrales que permitirán fijar las previsiones nacionales...
TEST RESULTSON SOME ATTACKS LEVERAGING ROGUE DEVICES SUCH AS POPULAR HACKING AND PEN-TEST TOOLS
Threats Posed by Rogue Devices on Organizations This executive summary provides an overview of the threats of rogue devices, explicitly focusing on popular pen-testing tools such...
Full Steam Ahead: Enhancing Maritime Cybersecurity
Since its inception, the United States has been a maritime nation dependent on its maritime transportation system (MTS) as vessels evolved from manpower-intensive wooden sailing ships...
Future of Memory Safety
Challenges and Recommendations On October 27th, 2022, Consumer Reports hosted an online convening to discuss ways to encourage widespread adoption of code written in memory-safe languages....
GDPR CASE STUDIES
2018 – 2023 The mission of the Data Protection Commission (DPC) is to uphold the consistent application of data protection law through engagement, supervision and enforcement,...
GDPR Compliance Project Initiation Document
The General Data Protection Regulation (GDPR) is one of the most significant pieces of legislation to be created by the European Union (EU) in recent years....