Close
  • Français
  • English

Operational security

ABSTRACT Dynamic Identity Verification and Authentication (DIVA) secure communications for all networks through the cloud and create secure virtual networks within the cloud. DIVA is a secure protocol that prevents all cyber security and identity theft attacks by demanding proof of identity at the time of network access and throughout the network session. It assigns…

Read More

Advanced evasion techniques (AETs) have developed quite a reputation in the information security sector, given their ability to disguise advanced persistent threats (APTs) and stealthily siphon out data. Although AETs have been active security threats for quite some time, several misconceptions remain. In an effort to dig deeper into how these threats are passing through…

Read More

Over the last years, numerous studies have demonstrated that small- and medium-sized enterprises are the main victims of economic cybercrime[1][2]. Beyond the initial suspicion regarding the origin of such studies (it could indeed be primarily a marketing attempt to enter an almost still-untapped market), the cost to fight cybercrime is undoubtedly an issue. And although…

Read More

Introduction In a previous article[1], we discussed how logs enable to identify the weak signals of cyber attacks. By correlating the events recorded in logs, performing a behavioural analysis of specific user profiles, enhancing logs with external resources and rendering the resulting analyses, it is possible to detect the so-called “weak signals” (weak because they…

Read More