In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce the attack surface and protect software is adoption of methodologies that apply security at …
R Kour, R Karim, A Thaduri - … , Part F: Journal of Rail and …, 2020 - journals.sagepub.com
With the advancements in and widespread adoption of information and communication technologies in infrastructures, cyber-attacks are becoming more frequent and more severe …
According to ESET, cybersecurity can be defined as the protection of information assets, through the treatment of threats that put at risk the information that is processed, stored and …
The identification and assessment of risks are a fundamental part of cybersecurity. Determining the elements that participate in this field is difficult because there is no …
J Domnik, A Holland - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense …
The EU NIS Directive introduces obligations related to the security of the network and information systems for Operators of Essential Services and for Digital Service Providers …
J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
In today's world, private and government organizations are legally obligated to prioritize their information security. They need to provide proof that they are continually improving their …
K Muronga, M Herselman, A Botha… - 2019 conference on …, 2019 - ieeexplore.ieee.org
This study aimed to ascertain the types of approaches that are applied in the assessments of information security and cybersecurity user awareness and training programs. The study …
Abstract Number of security evaluation instruments and security maturity models have been developed to evaluate the security level of organizations. These instruments provide results …