Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the attacked business or organization itself, but also may navigate to peer businesses/organizations in the same industry. Therefore, prevention and early detection of these attacks play a significant role in the continuity of operations in IT-dependent organizations. At the same time detection of various types of attacks has become extremely difficult as attacks get more sophisticated, distributed a...
The administration of a company's security measures is a crucial responsibility. A simple method for...
Companies outsource a lot of their development tasks. The use of external development teams introduc...
In order to achieve a high level of cyber security awareness most mid to large sized companies use S...
In recent years, there has been a considerable uptick in various cyberattacks. In recent years, ther...
Information security is a crucial element that should be prioritized in all organization today. With...
In the last years we can observe an increasing number of security incidents varying in their focus, ...
The risk of attacks on companies by organized crime increases as technology advances. Attacks that f...
The fast development of computer technology and electronic networks has contributed to the introduct...
The fast development of computer technology and electronic networks has contributed to the introduct...
This paper will examine in depth the reluctance of small to medium-sized enterprises (SMEs) to imple...
Companies outsource a lot of their development tasks. The use of external development teams introduc...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Nowadays every organization is exposed to the intrinsic risks associated to the use of Information T...
The changing Information Security (IS) landscape and increased legal, regulatory and audit complianc...
The ‘Critical ICT Infrastructures’ program managed by prof. dr. ir. Rob Kooij is a strategic researc...
The administration of a company's security measures is a crucial responsibility. A simple method for...
Companies outsource a lot of their development tasks. The use of external development teams introduc...
In order to achieve a high level of cyber security awareness most mid to large sized companies use S...
In recent years, there has been a considerable uptick in various cyberattacks. In recent years, ther...
Information security is a crucial element that should be prioritized in all organization today. With...
In the last years we can observe an increasing number of security incidents varying in their focus, ...
The risk of attacks on companies by organized crime increases as technology advances. Attacks that f...
The fast development of computer technology and electronic networks has contributed to the introduct...
The fast development of computer technology and electronic networks has contributed to the introduct...
This paper will examine in depth the reluctance of small to medium-sized enterprises (SMEs) to imple...
Companies outsource a lot of their development tasks. The use of external development teams introduc...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Nowadays every organization is exposed to the intrinsic risks associated to the use of Information T...
The changing Information Security (IS) landscape and increased legal, regulatory and audit complianc...
The ‘Critical ICT Infrastructures’ program managed by prof. dr. ir. Rob Kooij is a strategic researc...
The administration of a company's security measures is a crucial responsibility. A simple method for...
Companies outsource a lot of their development tasks. The use of external development teams introduc...
In order to achieve a high level of cyber security awareness most mid to large sized companies use S...