by Alexander | 4 June 2025
In cyber security, a role is a predefined set of rights and authorisations assigned to a user, a group of users, a system or an application. It determines what the entity can see, do or modify in an information system. Roles are used to manage access in a structured way, in line with the principle of least privilege (PoLP), in order to limit access to only those resources needed to perform legitimate tasks.
by Alexander | 4 March 2025
A rootkit is a sophisticated piece of malware designed to infiltrate a computer system and maintain privileged access (often at root level) while remaining stealthy.
by Alexander | 22 January 2025
The RPO (Recovery Point Objective) represents the maximum acceptable time interval between two data backups.
In other words, this is the maximum amount of data that a company can afford to lose in the event of a major incident, such as a server breakdown, fire or cyber-attack.
by Alexander | 8 October 2024
The RTO (Recovery Time Objective) represents the maximum acceptable length of interruption for a company after an incident, such as a breakdown or an attack. This is the time required to restore systems and resume normal operations.