Allgemein

Critical Boot Loader Vulnerability in Shim

Critical Boot Loader Vulnerability in Shim

Critical vulnerability in the Shim boot loader What to do? All Linux systems are vulnerable below Shim version 15.8. To mitigate this issue, it is recommended to patch the systems with the released patches and execute the OS command "fwupdmgr". Alternatively, reconfiguring the bootloader, specifically grub2, to avoid using Shim can also help.These actions can…

read more
1200 1200 Karl Schindler
Cybersecurity Trends 2024

Cybersecurity Trends 2024

Cybersecurity trends 2024 Intelligent & Resilient - Security through Automation Trend #1: Comprehensive protection The foremost trend centers around comprehensive protection, ensuring a unified shield across the entire IT infrastructure. Many companies currently employ isolated solutions for specific segments, leading to challenges in communication and a lack of visibility across the entire infrastructure. Understanding that…

read more
940 940 Karl Schindler
Cybersecurity Kill Chain

Cybersecurity Kill Chain

What is a Cybersecurity Kill Chain? understanding, detecting, and preventing persistent cyber threats Cybersecurity Kill Chain19. September 2023 What is a Cybersecurity Kill Chain? understanding, detecting, and preventing...Internship at C4SAM24. July 2023 Internship @ C4SAM Find out what our interns had to...Why should SMEs be interested in cybersecurity awareness14. June 2023 Why should anyone target…

read more
2230 2245 C4SAM
Internship at C4SAM

Internship at C4SAM

Internship @ C4SAM Find out what our interns had to say about their internship Read More Read More Read More Read More Read More Read More Read More Read More Load More

read more
720 720 C4SAM
Mastering GRC in 2023

Mastering GRC in 2023

Mastering GRC in 2023 4 Essential Priorities to Ensure Your Business's Success and Resilience Mastering GRC in 202328. April 2023 Mastering GRC in 2023 4 Essential Priorities to Ensure Your...Top 8 Prediction for Cybersecurity within the next 2 years31. March 2023 Top 8 Prediction for Cybersecurity within the next 2 years...Part 2 – Why you…

read more
1200 1200 C4SAM
Top 8 Prediction for Cybersecurity within the next 2 years

Top 8 Prediction for Cybersecurity within the next 2 years

Top 8 Prediction for Cybersecurity within the next 2 years Gartner analysts at the Security & Risk Management Summit in Sydney on March 28-29 have revealed their top eight cybersecurity predictions for 2023-2024.They suggest that cybersecurity leaders should incorporate the following assumptions into their security strategies for the next two years. Firstly, by 2027, around…

read more
940 940 C4SAM
Part 2 – Why you should implement security processes in service management and utilize a CMDB

Part 2 – Why you should implement security processes in service management and utilize a CMDB

Why you should implement security processes in service management and utilize a CMDB Part 2 Part 2 – Why you should implement security processes in service management and utilize a CMDB13. February 2023 Why you should implement security processes in service management and...Part 1 – Why you should implement security processes in service management and…

read more
940 940 C4SAM
Part 1 – Why you should implement security processes in service management and utilize a CMDB

Part 1 – Why you should implement security processes in service management and utilize a CMDB

Why you should implement security processes in service management and utilize a CMDB Part 1 Implementing security processes in ITIL and utilizing a Configuration Management Database (CMDB) can have numerous benefits for organizations looking to improve their overall security posture. In this article, we'll explore how to integrate security processes into the ITIL framework and…

read more
940 940 C4SAM
NIS 2

NIS 2

The new NIS 2 Regulation Companies and authorities need to upgrade their cybersecurity systems New guideline NIS2 (from November 2022) also requires medium-sized companies with 50 employees or more to tighten their cyber security guidelines. Failure to comply could result in high penalties.   Numerous companies, organizations and authorities will have to improve their IT security…

read more
940 700 C4SAM
  • 1
  • 2