Cybersecurity: Experience and best practices during COVID-19 pandemic

July 6, 2020

With this white paper focused on the emerging cyber threat that we world is facing during the COVID-19 crisis, NETIA wish to share his experience, his initiatives and his knowledge on those topics.

Spotlight

Cybelangel

CybelAngel is a cybersecurity start-up company. Our innovative solution is designed to help companies detect data leaks and technical threats in real time. Our proprietary Big Data algorithm enables us to detect threats on the Deep and Dark Web. The collected data is then automatically filtered and analyzed by our team of analysts. If the data is proven critical, alerts are quickly sent to our customers so that they can react in time. We perform real-time scans of the Dark Web, in other words, open communication channels commonly used by hackers: forums, blogs, social networks or public file hosting platforms. We identify threats that target our customers or their subsidiaries and we find the firm-specific stolen data (credit cards, logins / passwords, source codes, confidential documents).

OTHER WHITEPAPERS
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Zero Trust: Your Digital Transformation Requires a Risk Transformation

whitePaper | September 28, 2022

Modernizing your technology landscape requires a parallel cybersecurity strategy because your users and data are no longer protected by the corporate firewall. While the cloud provides unsurpassed agility, it also exposes new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More

Spotlight

Cybelangel

CybelAngel is a cybersecurity start-up company. Our innovative solution is designed to help companies detect data leaks and technical threats in real time. Our proprietary Big Data algorithm enables us to detect threats on the Deep and Dark Web. The collected data is then automatically filtered and analyzed by our team of analysts. If the data is proven critical, alerts are quickly sent to our customers so that they can react in time. We perform real-time scans of the Dark Web, in other words, open communication channels commonly used by hackers: forums, blogs, social networks or public file hosting platforms. We identify threats that target our customers or their subsidiaries and we find the firm-specific stolen data (credit cards, logins / passwords, source codes, confidential documents).

Events

Conference

Conference

Conference

Conference

Conference

Conference