Telegram : The messaging system that is becoming more and more attractive
Sydney’s stock market, Australian Securites Exchange (ASX), will soon be the first common financial market to adopt the blockchain technology. The eight largest share-market of the world current system, the Clearing House Electronic Subregistrer System (CHESS), records shareholdings and manages the settlement of share transactions. Despite its advantages, the…
Despite Snowden’s revelations about NSA mass surveillance program, the UK just adopted the most invasive surveillance law ever seen to date. He recently tweeted: “The UK has just legalized the most extreme surveillance in the history of western democracy. It goes further than many autocracies”. But what does it really mean ? (suite…)
Over the past 2 years, ISIS (Islamic State of Iraq and Syria) increased its territory and gained access over two major cities, Raqqa in Syria and Mosul in Iraq—a region with more than six million inhabitants. Also, it has successfully inflicted deep wound on the western world with the attacks…
In a post published on July 15th 2014, Google’s Online Security blog announced the launch of Project Zero, a team of “best practically-minded security researchers” – hackers – to work in favour of internet security.
The aim of this team and project is to put an end to major internet vulnerabilities and making sure “you [are] able to use the web without fear that a criminal or state-sponsored actor […] exploiting software bugs to infect your computer, steal secrets or monitor your communications.” (suite…)
Do you know what ISO 27001 is talking about? It is the international norm for the information security management system.
Nowadays, it is very important for a firm to get an ISO certification. ISO 27001 is an ISO certification, which can be very important for a firm operating in the IT sector, for example a firm, which operates in the cloud sector.
The main point of this norm is the implementation of the information security management system (ISMS). So, the IT-firm wants to install the standards for the protection of the information in case of breach of the availability, integrity or confidentiality of the information. This implementation guarantees the protection of the information for the clients and the providers.
(suite…)