Endpoint Cybersecurity GmbH
- Implementing ISO 27001:2022 Annex A.18 – Compliance
- Maping NIS2 requirements to the ISO 27001:2022 framework
- Implementing ISO 27001:2022 Annex A.17 – Information Security Aspects of Business Continuity Management
- Implementing ISO 27001:2022 Annex A.16 – Information Security Incident Management
- Executive summary: NIS2 Directive for the EU members (updated)
- NIS-2: 10 common misconceptions about the regulation
- Implementing ISO 27001:2022 Annex A.15 – Supplier Relationships
- Understanding ISO 27001:2022 Annex A.14 – System Acquisition, Development, and Maintenance
- Understanding ISO 27001:2022 Annex A.13 – Communications Security
- Understanding ISO 27001:2022 Annex A.12 – Operations Security
One year later: challenges for young anti-malware products today (presentation Virus Bulletin 2020)
/in PostDownloads Download slides (PDF) A year ago, at VB2019 we presented for the first time an overview of how the anti-malware world looks from the perspective of a young company trying to enter the market: how they try to build products, how they try to enter the market, how they try to convert users, […]
Challenges for young anti-malware products today (presentation Virus Bulletin 2019)
/in Posthttps://www.virusbulletin.com/conference/vb2019/abstracts/challenges-young-anti-malware-products-today Sorin Mustaca (Sorin Mustaca IT Security Consulting) Download the slides: https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Mustaca.pdf There are two categories of anti-malware vendors: Established anti-malware vendors, who are preoccupied with getting the best scores in detection tests and capturing more market share. Emerging anti-malware vendors, who are trying to understand what they need to do in order to enter the […]
Participant in the Cyber Security Alliance
/in PostA movie describing what this is: https://www.allianz-fuer-cybersicherheit.de/ACS/DE/Ueber_uns/ueber_uns.html