by Alexander | 4 February 2025
Indicators of Compromise (IoCs) are pieces of information that identify malicious or suspicious activity in a computer system or network. These indicators are mainly used to detect intrusions, malware infections, hacking attempts or any other form of cyber attack.
by Alexander | 24 October 2024
IPSec (Internet Protocol Security) is a set of protocols developed by the Internet Engineering Task Force (IETF) to secure communications over IP networks.
by Alexander | 18 October 2024
ISO 27001 is an international standard that provides a methodological framework for implementing, maintaining and continuously improving an information security management system (ISMS) to ensure the confidentiality, integrity and availability of an organisation's information.
by Alexander | 17 February 2025
ISO/IEC 27002 is an international standard providing a set of recommendations and best practices for implementing information security controls.
It provides a comprehensive set of recommendations and best practices to help organisations of all sizes and in all sectors to :
Identify and assess their information security risks.
Select and implement appropriate security measures to deal with these risks.
Establish, implement, maintain and improve their information security management system (ISMS).
by Alexander | 21 October 2024
ISO 27005 is an international standard that provides guidelines for managing information security risks.