2.Designate a responsible person or team
https://www.sorinmustaca.com/nis2-2-designate-a-responsible-person-or-team/#comment-673
Read More
https://www.sorinmustaca.com/nis2-1-perform-a-gap-analysis/#comment-641
wrote here https://www.sorinmustaca.com/how-to-nis2-eu-directive/ that the first step in implementing NIS2 requirements is to perform a gap
https://www.sorinmustaca.com/how-to-nis2-eu-directive/#comment-640
wrote here https://www.sorinmustaca.com/how-to-nis2-eu-directive/ that the first step in implementing NIS2 requirements is to perform a gap
https://www.sorinmustaca.com/how-to-nis2-eu-directive/#comment-639
Read More
https://www.sorinmustaca.com/how-to-nis2-eu-directive/#comment-634
Read More
https://www.sorinmustaca.com/executive-summary-nis2-directive-for-the-eu-members/#comment-630
This is a follow up article related to Secure Booting and Secure Flashing. It is the 5th article related to Strengthening the Security of Embedded Devices
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-625
is a follow up article related to Secure Booting and Secure Flashing. It is the 5th article related to Strengthening the Security of Embedded
is a follow up article related to Secure Booting and Secure Flashing. It is the 5th article related to Strengthening the Security of Embedded
The second article was Secure Booting for Embedded Devices: Safeguarding Systems from Intrusions
This is the third article in the series about embedded devices security, started with Strengthening the Security of Embedded Devices
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-619
This is the third article in the series about embedded devices security, started with Strengthening the Security of Embedded Devices
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-617
This is the second article in the series about embedded devices security, started with Strengthening the Security of Embedded Devices
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-615
This is the second article in the series about embedded devices security, started with Strengthening the Security of Embedded Devices
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-614
Read More
https://www.sorinmustaca.com/strengthening-the-security-of-embedded-devices/#comment-613
Read More
https://www.sorinmustaca.com/the-importance-of-training-employees-in-cybersecurity/#comment-609
Read More
https://www.sorinmustaca.com/the-importance-of-training-employees-in-cybersecurity/#comment-606
Sorin Mustaca has quite a few useful links: Sumup: CPU hardware vulnerable to side-channel attacks (Meltdown, Spectre and more)
week ago I wrote about the experiment of enhancing the headers of the website to show full compatibility with
One of the most complete posts about Ransomware: https://heimdalsecurity.com/blog/what-is-ransomware-protection/
https://www.sorinmustaca.com/ransomware-prevention-is-the-best-solution/#comment-575
Softpedia updated their article with my feedback: http://news.softpedia.com/news/malicious-macros-in-office-documents-find-new-tricks-to-evade-detection-505036.shtml
Ionut Arghire of SecurityWeek wrote a very good article about the potential breach of Myspace.com: 427 Million MySpace Passwords Appear For Sale (http://www.securityweek.com/427-million-myspace-p...
article About ransomware, Google malvertising and Fraud is worth reading for the description of how Locky spam may try to convince you to enable
https://www.sorinmustaca.com/about-ransomware-google-malvertising-and-fraud/#comment-566
Here is a more detailed article: https://hostingfacts.com/how-to-secure-wordpress/
https://www.sorinmustaca.com/how-to-combat-the-brute-force-attacks-on-wordpress-blogs/#comment-565
I received the reply from PayPal: THEY THINK IT IS A PHISHING SCAM ! Hello Sorin Mustaca, Thanks for forwarding that suspicious-looking email. You're right - it was a phishing attempt, and we're ...
The automatic answer from spoof@paypal.com: Dear Sorin Mustaca, Thank you for being a proactive contributor by reporting suspicious-looking emails to PayPal's Abuse Department. Our security team ...
let me know – I am available for hire as independent
wrote a dedicated post about this visit and what I think about the state of cyber security in
https://www.sorinmustaca.com/where-pc-security-and-automotive-security-meet/#comment-559
Read more →
https://www.sorinmustaca.com/would-you-sell-your-business-on-linkedin/#comment-537
Read more →
https://www.sorinmustaca.com/cyber-security-tips-in-german-and-english/#comment-532
Read more →
https://www.sorinmustaca.com/cyber-security-tips-in-german-and-english/#comment-531
Read more →
https://www.sorinmustaca.com/phishing-created-for-apples-mobile-devices/#comment-530
Read more →
https://www.sorinmustaca.com/phishing-created-for-apples-mobile-devices/#comment-529
Read more →
https://www.sorinmustaca.com/opendns-acquired-by-cisco/#comment-525
Read more →
https://www.sorinmustaca.com/opendns-acquired-by-cisco/#comment-524
wrote an article which recommends OpenDNS to FritzBox users to use OpenDNS to filter malicious domains and perform
https://www.sorinmustaca.com/fritzbox-users-protect-your-network-for-free/#comment-523
Read more →
https://www.sorinmustaca.com/fritzbox-users-protect-your-network-for-free/#comment-522