No Chance for Stuxnet & Company: Ways to Ensure Secure and Reliable Energy Supply

In 2009, a nuclear facility at Natanz in Iran became the location of an event that had never happened before: a highly complex and clever worm overcame several security barriers and sabotaged the functioning of the technical equipment necessary to enrich uranium, postponing the country’s nuclear program. This worm you may still remember, as Stuxnet gained access to control systems through connected computers, causing far-reaching political consequences as the world’s first cyber weapon attack. Is such an attack also possible in the D.A.CH. region, endangering…

SIEM in Real-Time: Really Necessary?

Imagine you had a burglar alarm for your IT infrastructure: a tool that raises your awareness of any anomaly detected in your cyber-environment. This is what a SIEM (Security Information and Event Management; pronounced SIM, with a silent e) tool does. The basic inputs are log-files, generated by your system’s components. Those are analyzed against a standard set of rules defining the normal state of your network. Once you are facing the decision to install such a system, a product description that it is working…

10 Steps to Survive a Data Breach (Part 2/2)

“An ounce of prevention is better than a pound of cure.” In line with this idiom, we discussed the prevention of a data breach in last week’s article. These measures are minimum prerequisites to reduce risk exposure and allow early detection. However, recent cyber-incidents have proven that breaches can happen to anyone and accordingly the following measures will help you deal with the situation effectively.

10 Steps to Survive a Data Breach (Part 1/2)

According to a study by Ponemon, a private security research institute, average costs of data breaches in Germany increased from 3.42 to 3.5 million Euros (data for 2013/2014). The costs are the result of post-data breach work such as investigation, remediation, legal counsel, help desk activity, customer churn and identity protection. Similar numbers for other central European countries apply.

Your Security Operations Center (SOC): Built, Shared or as-a-Service?

Cyber attacks have become ever more frequent, targeted and sophisticated. Millions of warnings are produced by platforms, applications and numerous point solutions like antivirus (AV), intrusion detection system (IDS)/ intrusion prevention system (IPS) and firewalls. Quality and speed of the response are essential to limit the impact on your organization. Unfortunately, the trend is going in the opposite direction. Due to the increased complexity of the attacks, companies are forced to employ more and more resources to detect and eliminate a threat. A professionally designed…

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden