Endpoint Cybersecurity GmbH
- Implementing ISO 27001:2022 Annex A.18 – Compliance
- Maping NIS2 requirements to the ISO 27001:2022 framework
- Implementing ISO 27001:2022 Annex A.17 – Information Security Aspects of Business Continuity Management
- Implementing ISO 27001:2022 Annex A.16 – Information Security Incident Management
- Executive summary: NIS2 Directive for the EU members (updated)
- NIS-2: 10 common misconceptions about the regulation
- Implementing ISO 27001:2022 Annex A.15 – Supplier Relationships
- Understanding ISO 27001:2022 Annex A.14 – System Acquisition, Development, and Maintenance
- Understanding ISO 27001:2022 Annex A.13 – Communications Security
- Understanding ISO 27001:2022 Annex A.12 – Operations Security
Risk Assessment of AWS services used in building a resilient Web App on AWS
/in EducationalWe wrote here in the article “Building Resilient Web Applications on AWS: A Comprehensive Approach to Security” how to use certain AWS services to implement a resilient web based application. The services mentioned require also a brief analysis in respect to Security, Confidentiality, Integrity, Availability and Privacy. Contents Toggle CloudTrail Risk Assessment Mitigation Privacy CloudWatch Risk […]
Endpoint Cybersecurity Sponsoring local volleyball team
/in PostEndpoint Cybersecurity GmbH is proud to sponsor the volleyball team of 12-16 years old from TV Langenargen. Endpoint Cybersecurity’s CEO, Sorin Mustaca proudly taking a photo together with the team.
Why companies producing security software need 3rd party help in adding additional security technologies
/in PostIf you produce some security software (Anti-malware, Anti-ransomware, URL Filter, etc.) you should never count only on one source of knowledge to deliver your product’s value to the customers. Many companies think that this is their core competence and they refuse to look into other directions. This is fundamentally wrong, even if you are a […]
How to make sure your product’s reputation is good
/in ServicesIf your product is already on the market, or if you just want to release it, you need to ensure that it has a good reputation. Balancing features that improve monetization with criteria that lower the product’s reputation is not an easy task. For this you need a partner with experience in Product and Project […]
Attending Virus Bulletin Conference in Prague
/in PostI will be representing my company Endpoint Cybersecurity GmbH in attending the Virus Bulletin Conference in Prague between 27.9 and 1.10. If you want an appointment, please Contact Us.