Threat Modeling : from Software Security to Cyber Risk Management
As the reliance on technology and interconnected systems continues to grow, so too do the potential consequences of cyber attacks....
Chief Product & Engineering Officer at XRATOR
- - -
I am an Entrepreneur and a Telecommunication Engineer with a post-graduate degree in Criminology. Before cofounding XRATOR, I was a cyber-threat intelligence researcher, analyst and investigator for large multi-national companies and the antivirus industry.
Outside my business activities, I like to share my knowledge by teaching threat intelligence, cyber-risk management and cybersecurity leadership in several French universities and Business Schools.
As the reliance on technology and interconnected systems continues to grow, so too do the potential consequences of cyber attacks....
Governments, technology companies, researchers, and platforms do not possess a unified approach to inspect the various types of cyber infractions...
The European Union Agency for Cybersecurity (ENISA) has determined and ordered the top 10 cybersecurity risks to arise by the...
The National Institute of Standards and Technology (NIST) has selected four encryption tools in July 2022 to withstand a future...
On Monday, November 7 of 2022, Lockbit hackers were supposed to publish "highly sensitive and confidential information" of Thales, a...
APT-36, also known as Transparent Tribe and Mythic Leopard, is a Pakistan-based APT group that targets Indian government employees. Zscaler...
On several occasions the Russian military has coupled its cyberattacks with conventional weapons aimed at the same targets. 🚩The...
Major Cyber Insurance now exclude Cyber Operation and Cyber War from...
Abstract Human is at the center of creation and usage of technologies; Human vulnerabilities...
Abstract The memory is one of the most important part of computer; 70%...
"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.