Endpoint Cybersecurity GmbH
- Comparing “Records of Processing Activities” (ROPA) and “Data Protection Impact Assessments” (DPIA) (with Podcast)
- AI vs. (secure) software developers
- Accelerating feature delivery in software development
- How-To create Security User Stories
- Delivering secure software in an agile way
- Understanding Defense in Depth in IT Security
- ISO 27001:2022 and TISAX: overlaps and differences
- Understanding the SOC 2 Certification
- Introduction to CISA’s Secure by Design Initiative
- Implementing ISO 27001:2022 Annex A.18 – Compliance
Challenges for young anti-malware products today (presentation Virus Bulletin 2019)
/in Posthttps://www.virusbulletin.com/conference/vb2019/abstracts/challenges-young-anti-malware-products-today Sorin Mustaca (Sorin Mustaca IT Security Consulting) Download the slides: https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Mustaca.pdf There are two categories of anti-malware vendors: Established anti-malware vendors, who are preoccupied with getting the best scores in detection tests and capturing more market share. Emerging anti-malware vendors, who are trying to understand what they need to do in order to enter the […]
Participant in the Cyber Security Alliance
/in PostA movie describing what this is: https://www.allianz-fuer-cybersicherheit.de/ACS/DE/Ueber_uns/ueber_uns.html