Credential Theft
The theft of credentials is one of today’s risks to Information Security that significantly increased with the rise of Social Engineering. Cyber criminals use credentials to intrude the infrastructure of …
Aug
The theft of credentials is one of today’s risks to Information Security that significantly increased with the rise of Social Engineering. Cyber criminals use credentials to intrude the infrastructure of …
May
The misuse of ones privileges is an intentional, malicious attack pattern. Most of the data breaches in 2021 in this category were caused by privilege abuse or data mishandling. They …
Apr
Unintentional actions are among the most common patterns in Information Security incidents. Miscellaneous errors of employees can directly compromise assets of an organization and lead to data breaches. According to …
Nov
Today one can observe constant attacks against every public IP address. Most of the attacks are fully automatic and not targeted towards a specific victim. These kind of attacks don’t …
Nov
An information security program aims to support a company achieving its business goals. The fields of action where the information security program can mainly contribute are the protection the confidentiality …
Mar
Information and supporting processes, systems and networks are of crucial business value and most of the time mission critical. The main security goals to achieve for business critical data and services …