New Search

If you are not happy with the results below please do another search

54 search results for:

49

What are the challenges of managing cyber-attacks in a large company?

With the ever-increasing risks of cyber-attacks, companies need to make cyber security a priority. Today, it is not a question of “if” a company will suffer a cyber-attack, but “when” it will fall victim. Therefore, organisations need to implement measures to prevent and manage cyber incidents. This article discusses the challenges of managing cyber incidents […]

51

eDiscovery – the search for relevant information for investigations

Every day, the amount of data in organisations grows and so do the opportunities to misuse it. With eDiscovery, data is located, secured and searched for use as evidence in civil or criminal proceedings. Our author is a specialist in this topic and explains the complex process of eDiscovery. Differentiating eDiscovery from digital forensics Since […]

52

Vulnerabilities discovered in Swiss Post’s e-voting system

The public intrusion test of Swiss Post’s e-voting system carried out in recent weeks has aroused a great deal of interest among experts and the public, especially when the discovery of serious vulnerabilities became known. These incidents show how important cooperation and transparency are in the introduction of e-voting. In mid-February, Swiss Post published the […]

53

Useful and secure digital identities for all areas of life and their properties

Digital identities are with us every day. The technical possibilities are very diverse. How can digital identities enable secure identification for eGovernment and eHealth on the one hand and guarantee privacy protection on the other? Digital identities enable access to the digital society. They represent persons, organisations and objects in the digital world and are […]

54

Cybersecurity und IT-Forensik

The focus “Cyber Security & IT Forensics” deals with selected topics related to the security of the computer infrastructure, such as confidentiality, integrity and availability of data, but also with questions related to the protection of privacy. The digital society only functions if people can rely on a secure and trustworthy computer infrastructure. This consists […]