O scurtă analiză despre cum merge securitatea cibernetică în România, și ce ar trebui făcut să meargă mai bine… Cum ajunge piața liberă sandwich între noul Centru European și ambițiile CERT-RO
An empirical analysis on how COVID-19 influenced cybersecurity globally, accompanied by a case study for Romania. Romanian version: https://www.gandul.ro/romania-post-pandemica-si-antidotul-digital/dan-tofan-ce-inseamna-covid-19-pentru-securitatea-cibernetica-opinie-19513296 English Version: Dan Tofan: What does COVID-19 mean for cybersecurity? |
In 1953, Project Solarium represented a significant “consensus exercise” among US senior officials responsible with national security. Given the plenitude of US agencies involved, consensus had to be met so as a properly respond to the Soviet communist threat, in the wake of the Cold War. The project ended up with a national strategy that […] |
Cyber security, as an industry, has recorded exponential growth, especially within the last two decades. It grew along with the Internet and evolved from a simple buzzword to a real technological risk that can put you out of business rather quickly. Within the last years cyber security seized media’s attention and reached on top of […] |
You must have surely heard a thing or two about GDPR. It’s short for General Data Protection Regulation, being EU’s latest regulation as regards privacy and data protection. It has entered into force on the 25th of May 2018. There’s a whole bunch of articles out there, surely you must have opened at least […] |
Short comprehensive guide on current status and what you need to know in order to properly adopt AI in your company. What exactly is AI?! Artificial Intelligence (AI) is the most compelling buzzword in tech. Just ignoring all of the alleged disruption that AI started to have upon everything, might seem like you […] |
Last week I was surprised to discover an engaging debate between Yuval Noah Harari (YNH) and Mark Zuckerberg (MZ), on the future of technology. I highly recommend the talk. It will give layman and tech people alike hints on current issues and future projections on technology development and its impact upon society as well […] |
Some interesting stuff that I found online: SECURITY: “Hidden backdoors” into Huawei’s equipment – https://www.bloomberg.com/news/articles/2019-04-30/vodafone-found-hidden-backdoors-in-huawei-equipment https://www.theregister.co.uk/2019/04/30/huawei_enterprise_router_backdoor_is_telnet/ Lessons learned from Maersk after NotPetya- https://www.zdnet.com/article/ransomware-the-key-lesson-maersk-learned-from-battling-the-notpetya-attack/ Good point of view on what is “reasonable security” – https://www.csoonline.com/article/3390150/what-is-reasonable-security-and-how-to-meet-the-requirement.amp.html ENISA’s human behavioral aspects of cyber security – https://www.enisa.europa.eu/publications/cybersecurity-culture-guidelines-behavioural-aspects-of-cybersecurity/ Top 25 women leaders in cyber security – https://www.thesoftwarereport.com/top-25-women-leaders-in-cybersecurity-of-2019/ […] |
Some interesting stuff that I found online: SECURITY: Interesting case involving Fortinet – https://www.cyberscoop.com/fortinet-legal-settlement-china-us-military/ EC decides there is no evidence Kaspersky is malicious – http://www.scmagazine.com/home/security-news/european-commission-no-evidence-kaspersky-software-is-malicious/ TajMahal, a sophisticated APT – https://securelist.com/project-tajmahal/90240/ Apparently, there is proof that Huawei was funded by Chinese state – https://www.forbes.com/sites/zakdoffman/2019/04/20/cia-offers-proof-huawei-has-been-funded-by-chinas-military-and-intelligence/#57b368377208 Stuxnet, goes as far as 2005 actually – https://www.darkreading.com/threat-intelligence/stuxnet-family-tree-grows/d/d-id/1334511 […] |
Some interesting stuff that I found online: SECURITY: Some of my thoughts on the future of cyber security – https://medium.com/@tofandan/how-about-the-future-of-cyber-security-ec1515a206c7 Interesting developments in the cyber insurance market – https://www.nytimes.com/2019/04/15/technology/cyberinsurance-notpetya-attack.html Top cyber security influencers to follow on social media – https://blog.appknox.com/top-cybersecurity-influencers/ Next steps for Julian Assange – https://www.politico.com/newsletters/morning-cybersecurity/2019/04/12/whats-next-for-julian-assange-581816 SOCIAL: A quick pick […] |