Allgemein

Cybersecurity Kill Chain

Cybersecurity Kill Chain

What is a Cybersecurity Kill Chain? understanding, detecting, and preventing persistent cyber threats Cybersecurity Kill Chain19. September 2023 What is a Cybersecurity Kill Chain? understanding, detecting, and preventing...Internship at C4SAM24. July 2023 Internship @ C4SAM Find out what our interns had to...Why should SMEs be interested in cybersecurity awareness14. June 2023 Why should anyone target…

read more
2230 2245 C4SAM
Internship at C4SAM

Internship at C4SAM

Internship @ C4SAM Find out what our interns had to say about their internship Read More Read More Read More Read More Read More Read More Read More Read More Load More

read more
720 720 C4SAM
Mastering GRC in 2023

Mastering GRC in 2023

Mastering GRC in 2023 4 Essential Priorities to Ensure Your Business's Success and Resilience Mastering GRC in 202328. April 2023 Mastering GRC in 2023 4 Essential Priorities to Ensure Your...Top 8 Prediction for Cybersecurity within the next 2 years31. March 2023 Top 8 Prediction for Cybersecurity within the next 2 years...Part 2 – Why you…

read more
1200 1200 C4SAM
Top 8 Prediction for Cybersecurity within the next 2 years

Top 8 Prediction for Cybersecurity within the next 2 years

Top 8 Prediction for Cybersecurity within the next 2 years Gartner analysts at the Security & Risk Management Summit in Sydney on March 28-29 have revealed their top eight cybersecurity predictions for 2023-2024.They suggest that cybersecurity leaders should incorporate the following assumptions into their security strategies for the next two years. Firstly, by 2027, around…

read more
940 940 C4SAM
Part 2 – Why you should implement security processes in service management and utilize a CMDB

Part 2 – Why you should implement security processes in service management and utilize a CMDB

Why you should implement security processes in service management and utilize a CMDB Part 2 Part 2 – Why you should implement security processes in service management and utilize a CMDB13. February 2023 Why you should implement security processes in service management and...Part 1 – Why you should implement security processes in service management and…

read more
940 940 C4SAM
Part 1 – Why you should implement security processes in service management and utilize a CMDB

Part 1 – Why you should implement security processes in service management and utilize a CMDB

Why you should implement security processes in service management and utilize a CMDB Part 1 Implementing security processes in ITIL and utilizing a Configuration Management Database (CMDB) can have numerous benefits for organizations looking to improve their overall security posture. In this article, we'll explore how to integrate security processes into the ITIL framework and…

read more
940 940 C4SAM
NIS 2

NIS 2

The new NIS 2 Regulation Companies and authorities need to upgrade their cybersecurity systems New guideline NIS2 (from November 2022) also requires medium-sized companies with 50 employees or more to tighten their cyber security guidelines. Failure to comply could result in high penalties.   Numerous companies, organizations and authorities will have to improve their IT security…

read more
940 700 C4SAM
SMBs are much more likely to be attacked

SMBs are much more likely to be attacked

SMBs are much more likely to be attacked by cybercriminals than large companies While cyber-attacks on large companies are in the news, attacks on SMBs are rarely heard of. And that even though SMEs in particular are a popular target for cybercriminals. It is high time for small and medium-sized companies to protect their IT…

read more
1000 547 C4SAM
Zeroday Vulnerabiltity in OpenSSL

Zeroday Vulnerabiltity in OpenSSL

/*! elementor - v3.8.0 - 30-10-2022 */ .elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));-ms-flex-item-align:stretch;align-self:stretch;-ms-flex-negative:0;flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))} /*! elementor - v3.8.0 - 30-10-2022 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} Zeroday vulnerabiltity in openssl - What to do? /*! elementor - v3.8.0 - 30-10-2022 */ .elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#2c2c2c;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:-webkit-box;display:-ms-flexbox;display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);-ms-flex-negative:0;flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:-webkit-box;display:-ms-flexbox;display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{-webkit-box-align:center;-ms-flex-align:center;align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:"";border-bottom:0;-webkit-box-flex:1;-ms-flex-positive:1;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{-webkit-box-flex:0;-ms-flex-positive:0;flex-grow:0;-ms-flex-negative:100;flex-shrink:100}.elementor-widget-divider--element-align-left…

read more
1280 608 C4SAM
  • 1
  • 2